age$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:09:54 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:09:54 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:09:54 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 601.989722] syz-executor.3: attempt to access beyond end of device [ 601.989722] loop3: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 601.990969] Buffer I/O error on dev loop3, logical block 10, lost async page write [ 602.007008] ieee802154 phy0 wpan0: encryption failed: -22 [ 602.018784] ieee802154 phy0 wpan0: encryption failed: -22 [ 602.043052] ieee802154 phy0 wpan0: encryption failed: -22 [ 602.047729] loop4: detected capacity change from 0 to 27 [ 602.052606] ieee802154 phy0 wpan0: encryption failed: -22 20:09:55 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) [ 602.080015] loop6: detected capacity change from 0 to 27 20:09:55 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 602.088153] ieee802154 phy0 wpan0: encryption failed: -22 [ 602.096538] ieee802154 phy0 wpan0: encryption failed: -22 20:09:55 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0xa) fsetxattr(r1, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r0, 0xffffffffffffffff, 0x0, 0xfffffdef) [ 602.120388] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 602.137727] FAT-fs (loop4): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 602.190406] loop3: detected capacity change from 0 to 40 20:09:55 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) 20:09:55 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:09:55 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:09:55 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0xa) fsetxattr(r1, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r0, 0xffffffffffffffff, 0x0, 0xfffffdef) [ 602.339484] ieee802154 phy0 wpan0: encryption failed: -22 [ 602.379128] loop3: detected capacity change from 0 to 40 [ 602.410113] ieee802154 phy0 wpan0: encryption failed: -22 [ 602.425900] ieee802154 phy0 wpan0: encryption failed: -22 [ 602.465338] loop4: detected capacity change from 0 to 27 [ 602.533743] FAT-fs (loop4): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:09:55 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:09:55 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) 20:09:55 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0xa) fsetxattr(r1, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r0, 0xffffffffffffffff, 0x0, 0xfffffdef) 20:09:55 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0xa) fsetxattr(r1, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0xfffffdef) [ 602.641536] loop3: detected capacity change from 0 to 40 [ 602.670473] loop2: detected capacity change from 0 to 40 [ 602.946778] loop6: detected capacity change from 0 to 27 [ 603.017281] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 616.201441] loop3: detected capacity change from 0 to 40 [ 616.204137] loop4: detected capacity change from 0 to 40 [ 616.208466] loop2: detected capacity change from 0 to 40 20:10:09 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:10:09 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:10:09 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:10:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 20:10:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) 20:10:09 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0xa) fsetxattr(r1, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0xfffffdef) 20:10:09 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:10:09 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 616.254109] ieee802154 phy0 wpan0: encryption failed: -22 [ 616.268203] ieee802154 phy0 wpan0: encryption failed: -22 [ 616.276180] ieee802154 phy0 wpan0: encryption failed: -22 20:10:09 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 616.410388] ieee802154 phy0 wpan0: encryption failed: -22 [ 616.422043] ieee802154 phy0 wpan0: encryption failed: -22 [ 616.445498] loop6: detected capacity change from 0 to 27 [ 616.447649] ieee802154 phy0 wpan0: encryption failed: -22 [ 616.599674] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:10:24 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:10:24 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:10:24 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:10:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) [ 631.207789] loop3: detected capacity change from 0 to 40 20:10:24 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:10:24 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:10:24 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:10:24 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0xa) fsetxattr(r1, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0xfffffdef) [ 631.234702] loop2: detected capacity change from 0 to 40 [ 631.248100] ieee802154 phy0 wpan0: encryption failed: -22 20:10:24 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 631.306291] ieee802154 phy0 wpan0: encryption failed: -22 [ 631.310433] ieee802154 phy0 wpan0: encryption failed: -22 [ 631.334745] ieee802154 phy0 wpan0: encryption failed: -22 [ 631.345504] ieee802154 phy0 wpan0: encryption failed: -22 [ 631.384303] ieee802154 phy0 wpan0: encryption failed: -22 [ 631.393144] ieee802154 phy0 wpan0: encryption failed: -22 [ 631.406797] loop6: detected capacity change from 0 to 27 20:10:24 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 631.409193] loop7: detected capacity change from 0 to 27 [ 631.421138] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 631.430288] ieee802154 phy0 wpan0: encryption failed: -22 [ 631.450747] ieee802154 phy0 wpan0: encryption failed: -22 [ 631.465421] loop4: detected capacity change from 0 to 27 [ 631.482464] FAT-fs (loop4): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 631.508858] FAT-fs (loop7): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:10:24 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) [ 631.547111] ieee802154 phy0 wpan0: encryption failed: -22 20:10:24 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="2c666c636f6e746578743d73797361e46d5f752c00798d06942c032d7ce5a1b4f93a186f29e7a47d66df15f5eb80d9a21ae0c4902693db4de5c6f9ae45455fdeb202d8120b299c48d9f7e77f11c74f6a8b47385686f50c63f56418d4c753f6ba30210bf76822bf56a7fa202a3f7b9675ef7109fe31ab007d7c3eb8869f4924788898af05b5e4814d673ebfccceb200833983c8384c6e14a5694a9c5e494eff26669b5b314b6fa00ae9b82265db2cd670b948c6df5e257b796ca4fc25da5fe866637a82802399c099dc250e722d870215e9eba7f5f4d31dc72a3de3e825d120ca9a001dbd97e8c33f61505fc5f134775b93dced030e309c27d7854325399d738cd38089d19fd44850bd4eea3f9f8108df35286e2eb12f41640d1f42ee2fcffa02556058e4accce4a3c86fd287a565f60a5db05575de5efddcb59bf3828ba1d825050dcc4351d322353e297423b8735e80b97605aff95cd62661a018ade24f756a1a04e15de1f54b"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 631.702742] loop2: detected capacity change from 0 to 40 20:10:24 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:10:24 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="2c666c636f6e746578743d73797361e46d5f752c00798d06942c032d7ce5a1b4f93a186f29e7a47d66df15f5eb80d9a21ae0c4902693db4de5c6f9ae45455fdeb202d8120b299c48d9f7e77f11c74f6a8b47385686f50c63f56418d4c753f6ba30210bf76822bf56a7fa202a3f7b9675ef7109fe31ab007d7c3eb8869f4924788898af05b5e4814d673ebfccceb200833983c8384c6e14a5694a9c5e494eff26669b5b314b6fa00ae9b82265db2cd670b948c6df5e257b796ca4fc25da5fe866637a82802399c099dc250e722d870215e9eba7f5f4d31dc72a3de3e825d120ca9a001dbd97e8c33f61505fc5f134775b93dced030e309c27d7854325399d738cd38089d19fd44850bd4eea3f9f8108df35286e2eb12f41640d1f42ee2fcffa02556058e4accce4a3c86fd287a565f60a5db05575de5efddcb59bf3828ba1d825050dcc4351d322353e297423b8735e80b97605aff95cd62661a018ade24f756a1a04e15de1f54b"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:10:24 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:10:24 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 631.953673] perf: interrupt took too long (5438 > 5383), lowering kernel.perf_event_max_sample_rate to 36000 [ 631.958038] perf: interrupt took too long (11160 > 10846), lowering kernel.perf_event_max_sample_rate to 17000 [ 631.974459] ieee802154 phy0 wpan0: encryption failed: -22 [ 631.981550] perf: interrupt took too long (13972 > 13950), lowering kernel.perf_event_max_sample_rate to 14000 [ 631.999177] ieee802154 phy0 wpan0: encryption failed: -22 [ 632.002517] ieee802154 phy0 wpan0: encryption failed: -22 [ 632.006600] loop6: detected capacity change from 0 to 27 [ 632.008204] ieee802154 phy0 wpan0: encryption failed: -22 [ 632.010289] ieee802154 phy0 wpan0: encryption failed: -22 [ 632.015246] ieee802154 phy0 wpan0: encryption failed: -22 [ 632.022657] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 632.041423] loop7: detected capacity change from 0 to 27 [ 632.042162] perf: interrupt took too long (17477 > 17465), lowering kernel.perf_event_max_sample_rate to 11000 [ 632.049248] loop4: detected capacity change from 0 to 27 [ 632.049813] FAT-fs (loop7): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:10:25 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 632.076660] ieee802154 phy0 wpan0: encryption failed: -22 [ 632.091643] FAT-fs (loop4): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 632.109074] ieee802154 phy0 wpan0: encryption failed: -22 [ 632.136575] ieee802154 phy0 wpan0: encryption failed: -22 [ 632.265213] ieee802154 phy0 wpan0: encryption failed: -22 20:10:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) 20:10:37 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:10:37 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:10:37 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:10:37 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:10:37 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:10:37 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) [ 644.443290] loop3: detected capacity change from 0 to 40 [ 644.461788] loop2: detected capacity change from 0 to 40 20:10:37 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="2c666c636f6e746578743d73797361e46d5f752c00798d06942c032d7ce5a1b4f93a186f29e7a47d66df15f5eb80d9a21ae0c4902693db4de5c6f9ae45455fdeb202d8120b299c48d9f7e77f11c74f6a8b47385686f50c63f56418d4c753f6ba30210bf76822bf56a7fa202a3f7b9675ef7109fe31ab007d7c3eb8869f4924788898af05b5e4814d673ebfccceb200833983c8384c6e14a5694a9c5e494eff26669b5b314b6fa00ae9b82265db2cd670b948c6df5e257b796ca4fc25da5fe866637a82802399c099dc250e722d870215e9eba7f5f4d31dc72a3de3e825d120ca9a001dbd97e8c33f61505fc5f134775b93dced030e309c27d7854325399d738cd38089d19fd44850bd4eea3f9f8108df35286e2eb12f41640d1f42ee2fcffa02556058e4accce4a3c86fd287a565f60a5db05575de5efddcb59bf3828ba1d825050dcc4351d322353e297423b8735e80b97605aff95cd62661a018ade24f756a1a04e15de1f54b"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 644.480605] ieee802154 phy0 wpan0: encryption failed: -22 [ 644.521485] ieee802154 phy0 wpan0: encryption failed: -22 [ 644.529562] ieee802154 phy0 wpan0: encryption failed: -22 [ 644.533796] ieee802154 phy0 wpan0: encryption failed: -22 [ 644.544398] ieee802154 phy0 wpan0: encryption failed: -22 [ 644.547358] ieee802154 phy0 wpan0: encryption failed: -22 [ 644.547756] loop6: detected capacity change from 0 to 27 [ 644.554569] ieee802154 phy0 wpan0: encryption failed: -22 [ 644.555633] ieee802154 phy0 wpan0: encryption failed: -22 [ 644.560639] ieee802154 phy0 wpan0: encryption failed: -22 [ 644.566081] loop4: detected capacity change from 0 to 27 20:10:37 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 644.581323] loop7: detected capacity change from 0 to 27 [ 644.582539] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 644.584529] ieee802154 phy0 wpan0: encryption failed: -22 [ 644.586235] FAT-fs (loop4): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 644.600750] FAT-fs (loop7): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 644.606152] ieee802154 phy0 wpan0: encryption failed: -22 20:10:37 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:10:37 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 644.720554] ieee802154 phy0 wpan0: encryption failed: -22 20:10:37 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:10:37 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:10:37 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:10:37 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:10:37 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 644.902362] ieee802154 phy0 wpan0: encryption failed: -22 [ 644.905701] ieee802154 phy0 wpan0: encryption failed: -22 [ 644.912622] ieee802154 phy0 wpan0: encryption failed: -22 [ 644.925491] ieee802154 phy0 wpan0: encryption failed: -22 [ 644.958198] ieee802154 phy0 wpan0: encryption failed: -22 [ 644.962852] ieee802154 phy0 wpan0: encryption failed: -22 [ 644.976140] loop7: detected capacity change from 0 to 27 [ 644.983823] FAT-fs (loop7): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 645.031349] ieee802154 phy0 wpan0: encryption failed: -22 [ 645.043345] ieee802154 phy0 wpan0: encryption failed: -22 [ 645.053576] loop6: detected capacity change from 0 to 27 [ 645.075213] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 645.081128] ieee802154 phy0 wpan0: encryption failed: -22 [ 645.099851] ieee802154 phy0 wpan0: encryption failed: -22 [ 645.131676] loop4: detected capacity change from 0 to 27 [ 645.161550] FAT-fs (loop4): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 645.317653] syz-executor.3 (5796) used greatest stack depth: 23024 bytes left [ 645.358692] syz-executor.2 (5801) used greatest stack depth: 22704 bytes left 20:10:51 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:10:51 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:10:51 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 20:10:51 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 658.195013] ieee802154 phy0 wpan0: encryption failed: -22 [ 658.201184] loop2: detected capacity change from 0 to 40 20:10:51 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:10:51 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:10:51 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 20:10:51 executing program 3: chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) [ 658.215252] ieee802154 phy0 wpan0: encryption failed: -22 [ 658.216038] ieee802154 phy0 wpan0: encryption failed: -22 [ 658.216669] ieee802154 phy0 wpan0: encryption failed: -22 [ 658.218623] ieee802154 phy0 wpan0: encryption failed: -22 [ 658.221303] loop6: detected capacity change from 0 to 27 [ 658.222387] loop4: detected capacity change from 0 to 27 [ 658.223793] loop7: detected capacity change from 0 to 40 [ 658.225552] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 658.226821] ieee802154 phy0 wpan0: encryption failed: -22 [ 658.228012] FAT-fs (loop4): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 658.230627] ieee802154 phy0 wpan0: encryption failed: -22 [ 658.235657] ieee802154 phy0 wpan0: encryption failed: -22 20:10:51 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:10:51 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:10:51 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:10:51 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:10:51 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 658.417842] ieee802154 phy0 wpan0: encryption failed: -22 [ 658.438828] ieee802154 phy0 wpan0: encryption failed: -22 [ 658.449991] ieee802154 phy0 wpan0: encryption failed: -22 [ 658.475103] loop6: detected capacity change from 0 to 27 [ 658.476826] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 658.544191] ieee802154 phy0 wpan0: encryption failed: -22 [ 658.554363] ieee802154 phy0 wpan0: encryption failed: -22 20:10:51 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 658.563617] ieee802154 phy0 wpan0: encryption failed: -22 [ 658.570851] ieee802154 phy0 wpan0: encryption failed: -22 [ 658.580442] ieee802154 phy0 wpan0: encryption failed: -22 [ 658.607720] loop4: detected capacity change from 0 to 27 [ 658.611688] FAT-fs (loop4): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 658.662107] ieee802154 phy0 wpan0: encryption failed: -22 20:10:51 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 659.059536] loop6: detected capacity change from 0 to 27 [ 659.079706] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:11:05 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:11:05 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:11:05 executing program 3: chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) 20:11:05 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:11:05 executing program 2: chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 20:11:05 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 672.402092] ieee802154 phy0 wpan0: encryption failed: -22 20:11:05 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:11:05 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 672.456516] ieee802154 phy0 wpan0: encryption failed: -22 [ 672.473746] ieee802154 phy0 wpan0: encryption failed: -22 [ 672.482769] ieee802154 phy0 wpan0: encryption failed: -22 [ 672.495182] ieee802154 phy0 wpan0: encryption failed: -22 [ 672.498812] ieee802154 phy0 wpan0: encryption failed: -22 [ 672.507195] ieee802154 phy0 wpan0: encryption failed: -22 [ 672.512945] loop6: detected capacity change from 0 to 27 20:11:05 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 672.530762] loop4: detected capacity change from 0 to 27 [ 672.531947] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 672.559722] FAT-fs (loop4): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:11:05 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:11:05 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 672.610745] ieee802154 phy0 wpan0: encryption failed: -22 [ 672.659685] ieee802154 phy0 wpan0: encryption failed: -22 [ 672.683717] ieee802154 phy0 wpan0: encryption failed: -22 [ 672.690394] ieee802154 phy0 wpan0: encryption failed: -22 [ 672.699483] ieee802154 phy0 wpan0: encryption failed: -22 [ 672.745731] loop7: detected capacity change from 0 to 27 [ 672.747081] ieee802154 phy0 wpan0: encryption failed: -22 20:11:05 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:11:05 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:11:05 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 672.882470] FAT-fs (loop7): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 672.918479] ieee802154 phy0 wpan0: encryption failed: -22 20:11:05 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 672.924709] ieee802154 phy0 wpan0: encryption failed: -22 [ 672.947276] loop4: detected capacity change from 0 to 27 20:11:05 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 672.954831] FAT-fs (loop4): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 673.026410] ieee802154 phy0 wpan0: encryption failed: -22 [ 673.027491] ieee802154 phy0 wpan0: encryption failed: -22 [ 673.063834] ieee802154 phy0 wpan0: encryption failed: -22 [ 673.071394] ieee802154 phy0 wpan0: encryption failed: -22 [ 673.102186] ieee802154 phy0 wpan0: encryption failed: -22 [ 673.103376] ieee802154 phy0 wpan0: encryption failed: -22 [ 673.110136] loop6: detected capacity change from 0 to 27 [ 673.116397] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:11:19 executing program 3: chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) 20:11:19 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:11:19 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:11:19 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:11:19 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:11:19 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x8040000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:11:19 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:11:19 executing program 2: chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) [ 686.502371] ieee802154 phy0 wpan0: encryption failed: -22 [ 686.512346] ieee802154 phy0 wpan0: encryption failed: -22 [ 686.513620] ieee802154 phy0 wpan0: encryption failed: -22 [ 686.515235] ieee802154 phy0 wpan0: encryption failed: -22 [ 686.522448] loop6: detected capacity change from 0 to 27 [ 686.528309] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 686.557665] ieee802154 phy0 wpan0: encryption failed: -22 [ 686.566618] ieee802154 phy0 wpan0: encryption failed: -22 20:11:19 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) [ 686.608788] ieee802154 phy0 wpan0: encryption failed: -22 [ 686.629011] loop7: detected capacity change from 0 to 40 20:11:19 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 686.700590] syz-executor.7: attempt to access beyond end of device [ 686.700590] loop7: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 686.701776] Buffer I/O error on dev loop7, logical block 10, lost async page write 20:11:19 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x8040000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:11:19 executing program 5: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:11:19 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:11:19 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:11:19 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 686.856398] ieee802154 phy0 wpan0: encryption failed: -22 [ 686.859822] ieee802154 phy0 wpan0: encryption failed: -22 [ 686.861123] loop6: detected capacity change from 0 to 27 [ 686.862713] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:11:19 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 686.948601] ieee802154 phy0 wpan0: encryption failed: -22 [ 686.955338] ieee802154 phy0 wpan0: encryption failed: -22 [ 687.045249] ieee802154 phy0 wpan0: encryption failed: -22 [ 687.063396] ieee802154 phy0 wpan0: encryption failed: -22 [ 687.073334] ieee802154 phy0 wpan0: encryption failed: -22 [ 687.078313] ieee802154 phy0 wpan0: encryption failed: -22 [ 687.089487] ieee802154 phy0 wpan0: encryption failed: -22 [ 687.117209] loop6: detected capacity change from 0 to 27 [ 687.141198] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 687.315153] syz-executor.3 (5933) used greatest stack depth: 22392 bytes left 20:11:38 executing program 5: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:11:38 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:11:38 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 705.588530] ieee802154 phy0 wpan0: encryption failed: -22 [ 705.589740] loop4: detected capacity change from 0 to 40 20:11:38 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) 20:11:38 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:11:38 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:11:38 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) 20:11:38 executing program 2: chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 20:11:38 executing program 5: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 705.633160] loop3: detected capacity change from 0 to 40 [ 705.637435] ieee802154 phy0 wpan0: encryption failed: -22 [ 705.638984] ieee802154 phy0 wpan0: encryption failed: -22 [ 705.645229] ieee802154 phy0 wpan0: encryption failed: -22 [ 705.648464] ieee802154 phy0 wpan0: encryption failed: -22 [ 705.649179] loop6: detected capacity change from 0 to 27 [ 705.658737] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 705.697762] syz-executor.4: attempt to access beyond end of device [ 705.697762] loop4: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 705.698846] Buffer I/O error on dev loop4, logical block 10, lost async page write [ 705.703149] ieee802154 phy0 wpan0: encryption failed: -22 20:11:38 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:11:38 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) [ 705.757153] ieee802154 phy0 wpan0: encryption failed: -22 20:11:38 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) [ 705.779764] ieee802154 phy0 wpan0: encryption failed: -22 20:11:38 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:11:38 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 705.853992] loop4: detected capacity change from 0 to 40 [ 705.886610] loop7: detected capacity change from 0 to 40 20:11:38 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 705.899731] ieee802154 phy0 wpan0: encryption failed: -22 [ 705.915618] ieee802154 phy0 wpan0: encryption failed: -22 [ 705.941554] loop6: detected capacity change from 0 to 27 [ 705.978447] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 706.040797] ieee802154 phy0 wpan0: encryption failed: -22 [ 706.121335] syz-executor.4: attempt to access beyond end of device [ 706.121335] loop4: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 706.123217] Buffer I/O error on dev loop4, logical block 10, lost async page write [ 706.144563] syz-executor.7: attempt to access beyond end of device [ 706.144563] loop7: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 706.146290] Buffer I/O error on dev loop7, logical block 10, lost async page write 20:11:52 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:11:52 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) 20:11:52 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(0xffffffffffffffff, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) 20:11:52 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:11:52 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:11:52 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:11:52 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 20:11:52 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) [ 719.605203] ieee802154 phy0 wpan0: encryption failed: -22 [ 719.614439] loop7: detected capacity change from 0 to 40 [ 719.621478] loop2: detected capacity change from 0 to 40 [ 719.622654] ieee802154 phy0 wpan0: encryption failed: -22 [ 719.623315] ieee802154 phy0 wpan0: encryption failed: -22 [ 719.631739] loop3: detected capacity change from 0 to 40 [ 719.636683] loop6: detected capacity change from 0 to 27 [ 719.646381] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:11:52 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 719.701742] ieee802154 phy0 wpan0: encryption failed: -22 [ 719.703626] ieee802154 phy0 wpan0: encryption failed: -22 20:11:52 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 719.724207] loop4: detected capacity change from 0 to 27 [ 719.736170] FAT-fs (loop4): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 719.784735] ieee802154 phy0 wpan0: encryption failed: -22 [ 719.794501] syz-executor.7: attempt to access beyond end of device [ 719.794501] loop7: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 719.796191] Buffer I/O error on dev loop7, logical block 10, lost async page write 20:11:52 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:11:52 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 719.866088] ieee802154 phy0 wpan0: encryption failed: -22 [ 719.869460] ieee802154 phy0 wpan0: encryption failed: -22 [ 719.873075] loop6: detected capacity change from 0 to 27 [ 719.877776] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:11:52 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) 20:11:52 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 719.945601] ieee802154 phy0 wpan0: encryption failed: -22 [ 719.964266] ieee802154 phy0 wpan0: encryption failed: -22 20:11:52 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 719.969279] ieee802154 phy0 wpan0: encryption failed: -22 [ 719.973312] loop6: detected capacity change from 0 to 27 [ 719.974321] loop4: detected capacity change from 0 to 40 20:11:52 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="2c666c636f6e746578743d73797361e46d5f752c00798d06942c032d7ce5a1b4f93a186f29e7a47d66df15f5eb80d9a21ae0c4902693db4de5c6f9ae45455fdeb202d8120b299c48d9f7e77f11c74f6a8b47385686f50c63f56418d4c753f6ba30210bf76822bf56a7fa202a3f7b9675ef7109fe31ab007d7c3eb8869f4924788898af05b5e4814d673ebfccceb200833983c8384c6e14a5694a9c5e494eff26669b5b314b6fa00ae9b82265db2cd670b948c6df5e257b796ca4fc25da5fe866637a82802399c099dc250e722d870215e9eba7f5f4d31dc72a3de3e825d120ca9a001dbd97e8c33f61505fc5f134775b93dced030e309c27d7854325399d738cd38089d19fd44850bd4eea3f9f8108df35286e2eb12f41640d1f42ee2fcffa02556058e4accce4a3c86fd287a565f60a5db05575de5efddcb59bf3828ba1d825050dcc4351d322353e297423b8735e80b97605aff95cd62661a018ade24f756a1a04e15de1f54b"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 719.981374] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:11:53 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 720.061232] ieee802154 phy0 wpan0: encryption failed: -22 [ 720.069536] ieee802154 phy0 wpan0: encryption failed: -22 [ 720.080076] loop6: detected capacity change from 0 to 27 [ 720.088568] ieee802154 phy0 wpan0: encryption failed: -22 [ 720.095167] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 720.097996] ieee802154 phy0 wpan0: encryption failed: -22 [ 720.107723] loop7: detected capacity change from 0 to 27 [ 720.126269] FAT-fs (loop7): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:12:05 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:12:05 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:12:05 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) 20:12:05 executing program 7: chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 20:12:05 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 20:12:06 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) 20:12:06 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) [ 733.010799] loop2: detected capacity change from 0 to 40 [ 733.016358] ieee802154 phy0 wpan0: encryption failed: -22 [ 733.017636] ieee802154 phy0 wpan0: encryption failed: -22 [ 733.021421] loop6: detected capacity change from 0 to 27 20:12:06 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 733.032310] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 733.054014] loop3: detected capacity change from 0 to 40 [ 733.090689] loop4: detected capacity change from 0 to 40 [ 733.107236] ieee802154 phy0 wpan0: encryption failed: -22 20:12:06 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r0, &(0x7f00000000c0)='9', 0x1, 0x8040000) r1 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r1, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r0, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:12:06 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}], 0x1, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 733.304435] ieee802154 phy0 wpan0: encryption failed: -22 20:12:06 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 733.377357] ieee802154 phy0 wpan0: encryption failed: -22 [ 733.399368] ieee802154 phy0 wpan0: encryption failed: -22 [ 733.418743] loop6: detected capacity change from 0 to 27 [ 733.425800] ieee802154 phy0 wpan0: encryption failed: -22 20:12:06 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}], 0x1, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 733.470730] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:12:06 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r0, &(0x7f00000000c0)='9', 0x1, 0x8040000) r1 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r1, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r0, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="2c666c636f6e746578743d73797361e46d5f752c00798d06942c032d7ce5a1b4f93a186f29e7a47d66df15f5eb80d9a21ae0c4902693db4de5c6f9ae45455fdeb202d8120b299c48d9f7e77f11c74f6a8b47385686f50c63f56418d4c753f6ba30210bf76822bf56a7fa202a3f7b9675ef7109fe31ab007d7c3eb8869f4924788898af05b5e4814d673ebfccceb200833983c8384c6e14a5694a9c5e494eff26669b5b314b6fa00ae9b82265db2cd670b948c6df5e257b796ca4fc25da5fe866637a82802399c099dc250e722d870215e9eba7f5f4d31dc72a3de3e825d120ca9a001dbd97e8c33f61505fc5f134775b93dced030e309c27d7854325399d738cd38089d19fd44850bd4eea3f9f8108df35286e2eb12f41640d1f42ee2fcffa02556058e4accce4a3c86fd287a565f60a5db05575de5efddcb59bf3828ba1d825050dcc4351d322353e297423b8735e80b97605aff95cd62661a018ade24f756a1a04e15de1f54b"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:12:06 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 733.642215] ieee802154 phy0 wpan0: encryption failed: -22 [ 733.700531] ieee802154 phy0 wpan0: encryption failed: -22 [ 733.703475] ieee802154 phy0 wpan0: encryption failed: -22 [ 733.715378] loop6: detected capacity change from 0 to 27 20:12:06 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}], 0x1, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 733.727569] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 733.754790] ieee802154 phy0 wpan0: encryption failed: -22 20:12:06 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r0, &(0x7f00000000c0)='9', 0x1, 0x8040000) r1 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r1, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r0, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="2c666c636f6e746578743d73797361e46d5f752c00798d06942c032d7ce5a1b4f93a186f29e7a47d66df15f5eb80d9a21ae0c4902693db4de5c6f9ae45455fdeb202d8120b299c48d9f7e77f11c74f6a8b47385686f50c63f56418d4c753f6ba30210bf76822bf56a7fa202a3f7b9675ef7109fe31ab007d7c3eb8869f4924788898af05b5e4814d673ebfccceb200833983c8384c6e14a5694a9c5e494eff26669b5b314b6fa00ae9b82265db2cd670b948c6df5e257b796ca4fc25da5fe866637a82802399c099dc250e722d870215e9eba7f5f4d31dc72a3de3e825d120ca9a001dbd97e8c33f61505fc5f134775b93dced030e309c27d7854325399d738cd38089d19fd44850bd4eea3f9f8108df35286e2eb12f41640d1f42ee2fcffa02556058e4accce4a3c86fd287a565f60a5db05575de5efddcb59bf3828ba1d825050dcc4351d322353e297423b8735e80b97605aff95cd62661a018ade24f756a1a04e15de1f54b"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 733.923487] ieee802154 phy0 wpan0: encryption failed: -22 [ 733.937276] ieee802154 phy0 wpan0: encryption failed: -22 [ 733.953156] ieee802154 phy0 wpan0: encryption failed: -22 [ 733.955697] loop6: detected capacity change from 0 to 27 [ 733.969520] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 746.146680] loop4: detected capacity change from 0 to 40 20:12:19 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) 20:12:19 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:12:19 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 20:12:19 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) 20:12:19 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 746.168369] loop3: detected capacity change from 0 to 40 [ 746.170114] ieee802154 phy0 wpan0: encryption failed: -22 20:12:19 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 20:12:19 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:12:19 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) [ 746.197310] ieee802154 phy0 wpan0: encryption failed: -22 [ 746.198522] ieee802154 phy0 wpan0: encryption failed: -22 [ 746.205666] loop2: detected capacity change from 0 to 40 [ 746.224720] loop7: detected capacity change from 0 to 40 [ 746.231407] ieee802154 phy0 wpan0: encryption failed: -22 [ 746.241992] ieee802154 phy0 wpan0: encryption failed: -22 20:12:19 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 746.253773] loop6: detected capacity change from 0 to 27 [ 746.294571] syz-executor.4: attempt to access beyond end of device [ 746.294571] loop4: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 746.296198] Buffer I/O error on dev loop4, logical block 10, lost async page write 20:12:19 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 746.318748] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 746.375167] ieee802154 phy0 wpan0: encryption failed: -22 [ 746.459150] ieee802154 phy0 wpan0: encryption failed: -22 [ 746.471738] ieee802154 phy0 wpan0: encryption failed: -22 20:12:19 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:12:19 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) r1 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r1, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:12:19 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="2c666c636f6e746578743d73797361e46d5f752c00798d06942c032d7ce5a1b4f93a186f29e7a47d66df15f5eb80d9a21ae0c4902693db4de5c6f9ae45455fdeb202d8120b299c48d9f7e77f11c74f6a8b47385686f50c63f56418d4c753f6ba30210bf76822bf56a7fa202a3f7b9675ef7109fe31ab007d7c3eb8869f4924788898af05b5e4814d673ebfccceb200833983c8384c6e14a5694a9c5e494eff26669b5b314b6fa00ae9b82265db2cd670b948c6df5e257b796ca4fc25da5fe866637a82802399c099dc250e722d870215e9eba7f5f4d31dc72a3de3e825d120ca9a001dbd97e8c33f61505fc5f134775b93dced030e309c27d7854325399d738cd38089d19fd44850bd4eea3f9f8108df35286e2eb12f41640d1f42ee2fcffa02556058e4accce4a3c86fd287a565f60a5db05575de5efddcb59bf3828ba1d825050dcc4351d322353e297423b8735e80b97605aff95cd62661a018ade24f756a1a04e15de1f54b"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 746.593238] ieee802154 phy0 wpan0: encryption failed: -22 20:12:19 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 746.655330] ieee802154 phy0 wpan0: encryption failed: -22 [ 746.667743] ieee802154 phy0 wpan0: encryption failed: -22 [ 746.703468] loop6: detected capacity change from 0 to 27 [ 746.725382] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:12:19 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 746.774150] ieee802154 phy0 wpan0: encryption failed: -22 [ 746.801231] ieee802154 phy0 wpan0: encryption failed: -22 [ 746.822284] ieee802154 phy0 wpan0: encryption failed: -22 [ 746.835533] loop4: detected capacity change from 0 to 27 [ 746.841224] ieee802154 phy0 wpan0: encryption failed: -22 20:12:19 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 746.862647] ieee802154 phy0 wpan0: encryption failed: -22 [ 746.864698] FAT-fs (loop4): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:12:19 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:12:20 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 747.083542] ieee802154 phy0 wpan0: encryption failed: -22 [ 747.094636] ieee802154 phy0 wpan0: encryption failed: -22 [ 747.113706] loop6: detected capacity change from 0 to 27 [ 747.164070] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 747.269227] ieee802154 phy0 wpan0: encryption failed: -22 [ 747.275475] ieee802154 phy0 wpan0: encryption failed: -22 [ 747.290637] loop4: detected capacity change from 0 to 27 [ 747.313346] FAT-fs (loop4): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:12:34 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) [ 761.551694] loop4: detected capacity change from 0 to 40 20:12:34 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:12:34 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 20:12:34 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 20:12:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) 20:12:34 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:12:34 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, 0x0, 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:12:34 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 761.564767] loop7: detected capacity change from 0 to 40 [ 761.569108] ieee802154 phy0 wpan0: encryption failed: -22 [ 761.571312] ieee802154 phy0 wpan0: encryption failed: -22 [ 761.574042] loop6: detected capacity change from 0 to 27 [ 761.582501] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 761.584144] loop3: detected capacity change from 0 to 40 [ 761.608252] loop2: detected capacity change from 0 to 40 20:12:34 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(0xffffffffffffffff, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) [ 761.638391] ieee802154 phy0 wpan0: encryption failed: -22 [ 761.644177] ieee802154 phy0 wpan0: encryption failed: -22 [ 761.666351] perf: interrupt took too long (21869 > 21846), lowering kernel.perf_event_max_sample_rate to 9000 20:12:34 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, 0x0, 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 761.710440] ieee802154 phy0 wpan0: encryption failed: -22 [ 761.750348] syz-executor.4: attempt to access beyond end of device [ 761.750348] loop4: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 761.752611] Buffer I/O error on dev loop4, logical block 10, lost async page write 20:12:34 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 761.824312] ieee802154 phy0 wpan0: encryption failed: -22 [ 761.837144] ieee802154 phy0 wpan0: encryption failed: -22 20:12:34 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 761.856785] loop6: detected capacity change from 0 to 27 [ 761.869598] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:12:34 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, 0x0, 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 761.996710] ieee802154 phy0 wpan0: encryption failed: -22 [ 762.008301] ieee802154 phy0 wpan0: encryption failed: -22 [ 762.010020] ieee802154 phy0 wpan0: encryption failed: -22 20:12:35 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, 0x0, 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 762.163448] ieee802154 phy0 wpan0: encryption failed: -22 [ 762.167659] ieee802154 phy0 wpan0: encryption failed: -22 [ 762.171115] ieee802154 phy0 wpan0: encryption failed: -22 [ 762.182772] ieee802154 phy0 wpan0: encryption failed: -22 [ 762.183705] loop4: detected capacity change from 0 to 27 [ 762.195655] FAT-fs (loop4): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 762.219754] loop6: detected capacity change from 0 to 27 [ 762.240595] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:12:47 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(0xffffffffffffffff, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 20:12:47 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:12:47 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(0xffffffffffffffff, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 20:12:47 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:12:47 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:12:47 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:12:47 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) 20:12:47 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) [ 774.629756] ieee802154 phy0 wpan0: encryption failed: -22 [ 774.630416] ieee802154 phy0 wpan0: encryption failed: -22 [ 774.637369] loop7: detected capacity change from 0 to 40 [ 774.640548] loop2: detected capacity change from 0 to 40 [ 774.642736] loop3: detected capacity change from 0 to 40 [ 774.648521] ieee802154 phy0 wpan0: encryption failed: -22 [ 774.654715] ieee802154 phy0 wpan0: encryption failed: -22 [ 774.670177] ieee802154 phy0 wpan0: encryption failed: -22 [ 774.700642] ieee802154 phy0 wpan0: encryption failed: -22 20:12:47 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 774.733257] ieee802154 phy0 wpan0: encryption failed: -22 [ 774.758319] loop6: detected capacity change from 0 to 27 [ 774.785815] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:12:47 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:12:47 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 774.866261] ieee802154 phy0 wpan0: encryption failed: -22 [ 774.867410] ieee802154 phy0 wpan0: encryption failed: -22 [ 774.868525] ieee802154 phy0 wpan0: encryption failed: -22 [ 774.875169] ieee802154 phy0 wpan0: encryption failed: -22 [ 774.915046] ieee802154 phy0 wpan0: encryption failed: -22 [ 774.928468] syz-executor.7: attempt to access beyond end of device [ 774.928468] loop7: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 774.930092] Buffer I/O error on dev loop7, logical block 10, lost async page write 20:12:47 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:12:47 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:12:48 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="2c666c636f6e746578743d73797361e46d5f752c00798d06942c032d7ce5a1b4f93a186f29e7a47d66df15f5eb80d9a21ae0c4902693db4de5c6f9ae45455fdeb202d8120b299c48d9f7e77f11c74f6a8b47385686f50c63f56418d4c753f6ba30210bf76822bf56a7fa202a3f7b9675ef7109fe31ab007d7c3eb8869f4924788898af05b5e4814d673ebfccceb200833983c8384c6e14a5694a9c5e494eff26669b5b314b6fa00ae9b82265db2cd670b948c6df5e257b796ca4fc25da5fe866637a82802399c099dc250e722d870215e9eba7f5f4d31dc72a3de3e825d120ca9a001dbd97e8c33f61505fc5f134775b93dced030e309c27d7854325399d738cd38089d19fd44850bd4eea3f9f8108df35286e2eb12f41640d1f42ee2fcffa02556058e4accce4a3c86fd287a565f60a5db05575de5efddcb59bf3828ba1d825050dcc4351d322353e297423b8735e80b97605aff95cd62661a018ade24f756a1a04e15de1f54b"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:12:48 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 775.116508] ieee802154 phy0 wpan0: encryption failed: -22 [ 775.137089] ieee802154 phy0 wpan0: encryption failed: -22 [ 775.143256] ieee802154 phy0 wpan0: encryption failed: -22 [ 775.148739] loop6: detected capacity change from 0 to 27 [ 775.159533] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 775.179312] ieee802154 phy0 wpan0: encryption failed: -22 [ 775.201230] ieee802154 phy0 wpan0: encryption failed: -22 [ 775.214812] ieee802154 phy0 wpan0: encryption failed: -22 [ 775.223379] loop4: detected capacity change from 0 to 27 [ 775.227836] ieee802154 phy0 wpan0: encryption failed: -22 20:12:48 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 775.268345] FAT-fs (loop4): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 775.407258] ieee802154 phy0 wpan0: encryption failed: -22 [ 775.417315] ieee802154 phy0 wpan0: encryption failed: -22 [ 775.436379] loop7: detected capacity change from 0 to 27 [ 775.449700] FAT-fs (loop7): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:13:01 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) 20:13:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) 20:13:01 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="2c666c636f6e746578743d73797361e46d5f752c00798d06942c032d7ce5a1b4f93a186f29e7a47d66df15f5eb80d9a21ae0c4902693db4de5c6f9ae45455fdeb202d8120b299c48d9f7e77f11c74f6a8b47385686f50c63f56418d4c753f6ba30210bf76822bf56a7fa202a3f7b9675ef7109fe31ab007d7c3eb8869f4924788898af05b5e4814d673ebfccceb200833983c8384c6e14a5694a9c5e494eff26669b5b314b6fa00ae9b82265db2cd670b948c6df5e257b796ca4fc25da5fe866637a82802399c099dc250e722d870215e9eba7f5f4d31dc72a3de3e825d120ca9a001dbd97e8c33f61505fc5f134775b93dced030e309c27d7854325399d738cd38089d19fd44850bd4eea3f9f8108df35286e2eb12f41640d1f42ee2fcffa02556058e4accce4a3c86fd287a565f60a5db05575de5efddcb59bf3828ba1d825050dcc4351d322353e297423b8735e80b97605aff95cd62661a018ade24f756a1a04e15de1f54b"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:13:01 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:13:01 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:13:01 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) [ 788.223950] loop4: detected capacity change from 0 to 40 [ 788.225847] ieee802154 phy0 wpan0: encryption failed: -22 [ 788.241196] loop2: detected capacity change from 0 to 40 20:13:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(0xffffffffffffffff, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 20:13:01 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) [ 788.265316] loop7: detected capacity change from 0 to 40 [ 788.277391] ieee802154 phy0 wpan0: encryption failed: -22 [ 788.279678] ieee802154 phy0 wpan0: encryption failed: -22 [ 788.283364] ieee802154 phy0 wpan0: encryption failed: -22 [ 788.287240] ieee802154 phy0 wpan0: encryption failed: -22 [ 788.297676] loop6: detected capacity change from 0 to 27 20:13:01 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 788.345481] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:13:01 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 788.423645] ieee802154 phy0 wpan0: encryption failed: -22 [ 788.483829] ieee802154 phy0 wpan0: encryption failed: -22 [ 788.484475] ieee802154 phy0 wpan0: encryption failed: -22 20:13:01 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:13:01 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 788.576630] ieee802154 phy0 wpan0: encryption failed: -22 20:13:01 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 788.650386] ieee802154 phy0 wpan0: encryption failed: -22 [ 788.669165] ieee802154 phy0 wpan0: encryption failed: -22 [ 788.696256] loop6: detected capacity change from 0 to 27 20:13:01 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 788.711497] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 788.741237] ieee802154 phy0 wpan0: encryption failed: -22 [ 788.758740] ieee802154 phy0 wpan0: encryption failed: -22 20:13:01 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 788.926563] ieee802154 phy0 wpan0: encryption failed: -22 [ 788.937047] ieee802154 phy0 wpan0: encryption failed: -22 [ 788.946501] loop6: detected capacity change from 0 to 27 [ 788.969182] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:13:13 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:13:13 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:13:13 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:13:13 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:13:13 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) 20:13:13 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 20:13:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) 20:13:13 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)}], 0x1}}], 0x1, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 800.879700] ieee802154 phy0 wpan0: encryption failed: -22 [ 800.886428] ieee802154 phy0 wpan0: encryption failed: -22 [ 800.898451] ieee802154 phy0 wpan0: encryption failed: -22 [ 800.903327] ieee802154 phy0 wpan0: encryption failed: -22 [ 800.908509] loop6: detected capacity change from 0 to 27 [ 800.914484] ieee802154 phy0 wpan0: encryption failed: -22 [ 800.925507] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 800.933298] ieee802154 phy0 wpan0: encryption failed: -22 [ 800.944190] ieee802154 phy0 wpan0: encryption failed: -22 [ 800.950819] loop7: detected capacity change from 0 to 27 [ 800.974421] FAT-fs (loop7): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:13:13 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:13:13 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)}], 0x1}}], 0x1, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:13:14 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)}], 0x1}}], 0x1, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:13:14 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, 0x0, 0x0, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 801.107147] ieee802154 phy0 wpan0: encryption failed: -22 [ 801.118716] ieee802154 phy0 wpan0: encryption failed: -22 [ 801.122109] ieee802154 phy0 wpan0: encryption failed: -22 20:13:14 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="2c666c636f6e746578743d73797361e46d5f752c00798d06942c032d7ce5a1b4f93a186f29e7a47d66df15f5eb80d9a21ae0c4902693db4de5c6f9ae45455fdeb202d8120b299c48d9f7e77f11c74f6a8b47385686f50c63f56418d4c753f6ba30210bf76822bf56a7fa202a3f7b9675ef7109fe31ab007d7c3eb8869f4924788898af05b5e4814d673ebfccceb200833983c8384c6e14a5694a9c5e494eff26669b5b314b6fa00ae9b82265db2cd670b948c6df5e257b796ca4fc25da5fe866637a82802399c099dc250e722d870215e9eba7f5f4d31dc72a3de3e825d120ca9a001dbd97e8c33f61505fc5f134775b93dced030e309c27d7854325399d738cd38089d19fd44850bd4eea3f9f8108df35286e2eb12f41640d1f42ee2fcffa02556058e4accce4a3c86fd287a565f60a5db05575de5efddcb59bf3828ba1d825050dcc4351d322353e297423b8735e80b97605aff95cd62661a018ade24f756a1a04e15de1f54b"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 801.128504] loop6: detected capacity change from 0 to 27 [ 801.161687] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 801.190358] ieee802154 phy0 wpan0: encryption failed: -22 20:13:14 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, 0x0, 0x0, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="2c666c636f6e746578743d73797361e46d5f752c00798d06942c032d7ce5a1b4f93a186f29e7a47d66df15f5eb80d9a21ae0c4902693db4de5c6f9ae45455fdeb202d8120b299c48d9f7e77f11c74f6a8b47385686f50c63f56418d4c753f6ba30210bf76822bf56a7fa202a3f7b9675ef7109fe31ab007d7c3eb8869f4924788898af05b5e4814d673ebfccceb200833983c8384c6e14a5694a9c5e494eff26669b5b314b6fa00ae9b82265db2cd670b948c6df5e257b796ca4fc25da5fe866637a82802399c099dc250e722d870215e9eba7f5f4d31dc72a3de3e825d120ca9a001dbd97e8c33f61505fc5f134775b93dced030e309c27d7854325399d738cd38089d19fd44850bd4eea3f9f8108df35286e2eb12f41640d1f42ee2fcffa02556058e4accce4a3c86fd287a565f60a5db05575de5efddcb59bf3828ba1d825050dcc4351d322353e297423b8735e80b97605aff95cd62661a018ade24f756a1a04e15de1f54b"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 801.287183] ieee802154 phy0 wpan0: encryption failed: -22 [ 801.310096] ieee802154 phy0 wpan0: encryption failed: -22 20:13:14 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)}], 0x1}}], 0x1, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 801.353769] loop7: detected capacity change from 0 to 27 20:13:14 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 801.403205] FAT-fs (loop7): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:13:14 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, 0x0, 0x0, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 801.494824] ieee802154 phy0 wpan0: encryption failed: -22 [ 801.515213] ieee802154 phy0 wpan0: encryption failed: -22 [ 801.535285] ieee802154 phy0 wpan0: encryption failed: -22 [ 801.543694] loop6: detected capacity change from 0 to 27 [ 801.557212] ieee802154 phy0 wpan0: encryption failed: -22 [ 801.570691] ieee802154 phy0 wpan0: encryption failed: -22 [ 801.601666] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:13:14 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, 0x0, 0x0, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:13:14 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, 0x0, 0x0, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:13:14 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="2c666c636f6e746578743d73797361e46d5f752c00798d06942c032d7ce5a1b4f93a186f29e7a47d66df15f5eb80d9a21ae0c4902693db4de5c6f9ae45455fdeb202d8120b299c48d9f7e77f11c74f6a8b47385686f50c63f56418d4c753f6ba30210bf76822bf56a7fa202a3f7b9675ef7109fe31ab007d7c3eb8869f4924788898af05b5e4814d673ebfccceb200833983c8384c6e14a5694a9c5e494eff26669b5b314b6fa00ae9b82265db2cd670b948c6df5e257b796ca4fc25da5fe866637a82802399c099dc250e722d870215e9eba7f5f4d31dc72a3de3e825d120ca9a001dbd97e8c33f61505fc5f134775b93dced030e309c27d7854325399d738cd38089d19fd44850bd4eea3f9f8108df35286e2eb12f41640d1f42ee2fcffa02556058e4accce4a3c86fd287a565f60a5db05575de5efddcb59bf3828ba1d825050dcc4351d322353e297423b8735e80b97605aff95cd62661a018ade24f756a1a04e15de1f54b"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 801.810834] ieee802154 phy0 wpan0: encryption failed: -22 [ 801.826172] ieee802154 phy0 wpan0: encryption failed: -22 [ 801.836072] ieee802154 phy0 wpan0: encryption failed: -22 [ 801.837732] ieee802154 phy0 wpan0: encryption failed: -22 [ 801.839684] loop7: detected capacity change from 0 to 27 [ 801.839748] loop6: detected capacity change from 0 to 27 [ 801.845130] ieee802154 phy0 wpan0: encryption failed: -22 [ 801.848468] ieee802154 phy0 wpan0: encryption failed: -22 [ 801.851743] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 801.856053] FAT-fs (loop7): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:13:29 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:13:29 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000000540)=0x100000000, 0xbf) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:13:29 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:13:29 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 20:13:29 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:13:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) 20:13:29 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 20:13:29 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0), 0x0, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 816.963324] ieee802154 phy0 wpan0: encryption failed: -22 [ 816.980833] ieee802154 phy0 wpan0: encryption failed: -22 [ 816.994461] ieee802154 phy0 wpan0: encryption failed: -22 [ 816.999594] ieee802154 phy0 wpan0: encryption failed: -22 [ 817.008826] loop6: detected capacity change from 0 to 27 [ 817.021655] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:13:30 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000000540)=0x100000000, 0xbf) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 817.091178] ieee802154 phy0 wpan0: encryption failed: -22 [ 817.114042] ieee802154 phy0 wpan0: encryption failed: -22 [ 817.154574] ieee802154 phy0 wpan0: encryption failed: -22 20:13:30 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:13:30 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000000540)=0x100000000, 0xbf) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:13:30 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:13:30 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0), 0x0, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:13:30 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 817.332571] ieee802154 phy0 wpan0: encryption failed: -22 [ 817.360459] ieee802154 phy0 wpan0: encryption failed: -22 [ 817.418073] ieee802154 phy0 wpan0: encryption failed: -22 [ 817.420533] ieee802154 phy0 wpan0: encryption failed: -22 [ 817.456245] loop6: detected capacity change from 0 to 27 [ 817.490428] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 817.530173] ieee802154 phy0 wpan0: encryption failed: -22 [ 817.547362] ieee802154 phy0 wpan0: encryption failed: -22 20:13:43 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:13:43 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:13:43 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 20:13:43 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0), 0x0, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:13:43 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}], 0x1, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 830.392516] ieee802154 phy0 wpan0: encryption failed: -22 [ 830.393746] ieee802154 phy0 wpan0: encryption failed: -22 [ 830.403316] ieee802154 phy0 wpan0: encryption failed: -22 [ 830.406579] ieee802154 phy0 wpan0: encryption failed: -22 20:13:43 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:13:43 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0), 0x0, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:13:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) [ 830.418610] loop7: detected capacity change from 0 to 27 [ 830.434984] ieee802154 phy0 wpan0: encryption failed: -22 [ 830.437158] ieee802154 phy0 wpan0: encryption failed: -22 [ 830.437792] ieee802154 phy0 wpan0: encryption failed: -22 [ 830.442147] ieee802154 phy0 wpan0: encryption failed: -22 [ 830.443599] ieee802154 phy0 wpan0: encryption failed: -22 [ 830.444764] FAT-fs (loop7): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 830.448803] ieee802154 phy0 wpan0: encryption failed: -22 [ 830.450338] loop6: detected capacity change from 0 to 27 [ 830.454098] loop4: detected capacity change from 0 to 27 [ 830.454798] FAT-fs (loop3): bogus number of reserved sectors [ 830.455783] FAT-fs (loop3): Can't find a valid FAT filesystem [ 830.483582] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:13:43 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 830.511214] FAT-fs (loop4): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:13:43 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, 0x0) 20:13:43 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500), 0x0, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:13:43 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x0) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="2c666c636f6e746578743d73797361e46d5f752c00798d06942c032d7ce5a1b4f93a186f29e7a47d66df15f5eb80d9a21ae0c4902693db4de5c6f9ae45455fdeb202d8120b299c48d9f7e77f11c74f6a8b47385686f50c63f56418d4c753f6ba30210bf76822bf56a7fa202a3f7b9675ef7109fe31ab007d7c3eb8869f4924788898af05b5e4814d673ebfccceb200833983c8384c6e14a5694a9c5e494eff26669b5b314b6fa00ae9b82265db2cd670b948c6df5e257b796ca4fc25da5fe866637a82802399c099dc250e722d870215e9eba7f5f4d31dc72a3de3e825d120ca9a001dbd97e8c33f61505fc5f134775b93dced030e309c27d7854325399d738cd38089d19fd44850bd4eea3f9f8108df35286e2eb12f41640d1f42ee2fcffa02556058e4accce4a3c86fd287a565f60a5db05575de5efddcb59bf3828ba1d825050dcc4351d322353e297423b8735e80b97605aff95cd62661a018ade24f756a1a04e15de1f54b"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:13:43 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000000540)=0x100000000, 0xbf) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 830.709104] ieee802154 phy0 wpan0: encryption failed: -22 [ 830.723915] ieee802154 phy0 wpan0: encryption failed: -22 20:13:43 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 830.783408] ieee802154 phy0 wpan0: encryption failed: -22 [ 830.824595] ieee802154 phy0 wpan0: encryption failed: -22 [ 830.848749] ieee802154 phy0 wpan0: encryption failed: -22 20:13:43 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, 0x0) [ 830.864569] loop6: detected capacity change from 0 to 27 [ 830.889777] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:13:43 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000000540)=0x100000000, 0xbf) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 830.982081] ieee802154 phy0 wpan0: encryption failed: -22 [ 830.991666] ieee802154 phy0 wpan0: encryption failed: -22 [ 830.998536] ieee802154 phy0 wpan0: encryption failed: -22 [ 830.999791] ieee802154 phy0 wpan0: encryption failed: -22 [ 831.036245] ieee802154 phy0 wpan0: encryption failed: -22 [ 831.051435] ieee802154 phy0 wpan0: encryption failed: -22 [ 831.070271] ieee802154 phy0 wpan0: encryption failed: -22 20:13:44 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:13:44 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x0) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="2c666c636f6e746578743d73797361e46d5f752c00798d06942c032d7ce5a1b4f93a186f29e7a47d66df15f5eb80d9a21ae0c4902693db4de5c6f9ae45455fdeb202d8120b299c48d9f7e77f11c74f6a8b47385686f50c63f56418d4c753f6ba30210bf76822bf56a7fa202a3f7b9675ef7109fe31ab007d7c3eb8869f4924788898af05b5e4814d673ebfccceb200833983c8384c6e14a5694a9c5e494eff26669b5b314b6fa00ae9b82265db2cd670b948c6df5e257b796ca4fc25da5fe866637a82802399c099dc250e722d870215e9eba7f5f4d31dc72a3de3e825d120ca9a001dbd97e8c33f61505fc5f134775b93dced030e309c27d7854325399d738cd38089d19fd44850bd4eea3f9f8108df35286e2eb12f41640d1f42ee2fcffa02556058e4accce4a3c86fd287a565f60a5db05575de5efddcb59bf3828ba1d825050dcc4351d322353e297423b8735e80b97605aff95cd62661a018ade24f756a1a04e15de1f54b"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 831.098428] loop4: detected capacity change from 0 to 27 [ 831.122575] FAT-fs (loop4): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 831.242612] ieee802154 phy0 wpan0: encryption failed: -22 [ 831.246299] ieee802154 phy0 wpan0: encryption failed: -22 [ 831.288423] ieee802154 phy0 wpan0: encryption failed: -22 [ 831.294187] ieee802154 phy0 wpan0: encryption failed: -22 [ 831.317399] loop6: detected capacity change from 0 to 27 [ 831.323326] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:13:57 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x0) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="2c666c636f6e746578743d73797361e46d5f752c00798d06942c032d7ce5a1b4f93a186f29e7a47d66df15f5eb80d9a21ae0c4902693db4de5c6f9ae45455fdeb202d8120b299c48d9f7e77f11c74f6a8b47385686f50c63f56418d4c753f6ba30210bf76822bf56a7fa202a3f7b9675ef7109fe31ab007d7c3eb8869f4924788898af05b5e4814d673ebfccceb200833983c8384c6e14a5694a9c5e494eff26669b5b314b6fa00ae9b82265db2cd670b948c6df5e257b796ca4fc25da5fe866637a82802399c099dc250e722d870215e9eba7f5f4d31dc72a3de3e825d120ca9a001dbd97e8c33f61505fc5f134775b93dced030e309c27d7854325399d738cd38089d19fd44850bd4eea3f9f8108df35286e2eb12f41640d1f42ee2fcffa02556058e4accce4a3c86fd287a565f60a5db05575de5efddcb59bf3828ba1d825050dcc4351d322353e297423b8735e80b97605aff95cd62661a018ade24f756a1a04e15de1f54b"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:13:57 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x0) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:13:57 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 20:13:57 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500), 0x0, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:13:57 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:13:57 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, 0x0) 20:13:57 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="2c666c636f6e746578743d73797361e46d5f752c00798d06942c032d7ce5a1b4f93a186f29e7a47d66df15f5eb80d9a21ae0c4902693db4de5c6f9ae45455fdeb202d8120b299c48d9f7e77f11c74f6a8b47385686f50c63f56418d4c753f6ba30210bf76822bf56a7fa202a3f7b9675ef7109fe31ab007d7c3eb8869f4924788898af05b5e4814d673ebfccceb200833983c8384c6e14a5694a9c5e494eff26669b5b314b6fa00ae9b82265db2cd670b948c6df5e257b796ca4fc25da5fe866637a82802399c099dc250e722d870215e9eba7f5f4d31dc72a3de3e825d120ca9a001dbd97e8c33f61505fc5f134775b93dced030e309c27d7854325399d738cd38089d19fd44850bd4eea3f9f8108df35286e2eb12f41640d1f42ee2fcffa02556058e4accce4a3c86fd287a565f60a5db05575de5efddcb59bf3828ba1d825050dcc4351d322353e297423b8735e80b97605aff95cd62661a018ade24f756a1a04e15de1f54b"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:13:57 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) [ 844.557546] FAT-fs (loop2): bogus number of reserved sectors [ 844.558068] FAT-fs (loop2): Can't find a valid FAT filesystem [ 844.561629] FAT-fs (loop3): bogus number of reserved sectors [ 844.562159] FAT-fs (loop3): Can't find a valid FAT filesystem [ 844.564522] ieee802154 phy0 wpan0: encryption failed: -22 [ 844.569024] ieee802154 phy0 wpan0: encryption failed: -22 [ 844.571132] loop7: detected capacity change from 0 to 27 [ 844.579279] ieee802154 phy0 wpan0: encryption failed: -22 [ 844.581783] FAT-fs (loop7): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 844.594320] ieee802154 phy0 wpan0: encryption failed: -22 [ 844.598405] ieee802154 phy0 wpan0: encryption failed: -22 [ 844.605557] ieee802154 phy0 wpan0: encryption failed: -22 [ 844.615294] ieee802154 phy0 wpan0: encryption failed: -22 [ 844.616761] loop6: detected capacity change from 0 to 27 [ 844.620237] ieee802154 phy0 wpan0: encryption failed: -22 [ 844.623719] ieee802154 phy0 wpan0: encryption failed: -22 [ 844.627455] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 844.674046] loop4: detected capacity change from 0 to 27 20:13:57 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500), 0x0, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 844.702297] FAT-fs (loop4): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:13:57 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:13:57 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) 20:13:57 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:13:57 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 844.951133] ieee802154 phy0 wpan0: encryption failed: -22 [ 844.963680] FAT-fs (loop7): bogus number of reserved sectors [ 844.964751] FAT-fs (loop7): Can't find a valid FAT filesystem [ 844.966306] loop6: detected capacity change from 0 to 27 20:13:57 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 845.003540] ieee802154 phy0 wpan0: encryption failed: -22 [ 845.011063] ieee802154 phy0 wpan0: encryption failed: -22 [ 845.014021] ieee802154 phy0 wpan0: encryption failed: -22 [ 845.019547] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 845.021013] ieee802154 phy0 wpan0: encryption failed: -22 [ 845.032294] loop4: detected capacity change from 0 to 27 [ 845.052333] FAT-fs (loop4): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:13:58 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 845.126496] ieee802154 phy0 wpan0: encryption failed: -22 [ 845.132805] ieee802154 phy0 wpan0: encryption failed: -22 20:13:58 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) [ 845.163425] loop1: detected capacity change from 0 to 27 [ 845.175030] FAT-fs (loop1): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 845.258317] ieee802154 phy0 wpan0: encryption failed: -22 20:13:58 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, r2, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:13:58 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 845.461339] loop4: detected capacity change from 0 to 27 [ 845.469430] ieee802154 phy0 wpan0: encryption failed: -22 [ 845.489430] FAT-fs (loop4): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 845.493489] loop6: detected capacity change from 0 to 27 [ 845.554696] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:13:58 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, r2, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:13:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) 20:13:58 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:13:58 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) [ 845.657508] FAT-fs (loop3): bogus number of reserved sectors [ 845.658653] FAT-fs (loop3): Can't find a valid FAT filesystem [ 845.659229] ieee802154 phy0 wpan0: encryption failed: -22 20:13:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) [ 845.801307] FAT-fs (loop2): bogus number of reserved sectors [ 845.802442] FAT-fs (loop2): Can't find a valid FAT filesystem 20:13:58 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="2c666c636f6e746578743d73797361e46d5f752c00798d06942c032d7ce5a1b4f93a186f29e7a47d66df15f5eb80d9a21ae0c4902693db4de5c6f9ae45455fdeb202d8120b299c48d9f7e77f11c74f6a8b47385686f50c63f56418d4c753f6ba30210bf76822bf56a7fa202a3f7b9675ef7109fe31ab007d7c3eb8869f4924788898af05b5e4814d673ebfccceb200833983c8384c6e14a5694a9c5e494eff26669b5b314b6fa00ae9b82265db2cd670b948c6df5e257b796ca4fc25da5fe866637a82802399c099dc250e722d870215e9eba7f5f4d31dc72a3de3e825d120ca9a001dbd97e8c33f61505fc5f134775b93dced030e309c27d7854325399d738cd38089d19fd44850bd4eea3f9f8108df35286e2eb12f41640d1f42ee2fcffa02556058e4accce4a3c86fd287a565f60a5db05575de5efddcb59bf3828ba1d825050dcc4351d322353e297423b8735e80b97605aff95cd62661a018ade24f756a1a04e15de1f54b"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 845.852746] loop1: detected capacity change from 0 to 27 [ 845.865820] FAT-fs (loop1): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:13:58 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 845.914765] ieee802154 phy0 wpan0: encryption failed: -22 [ 845.925795] loop6: detected capacity change from 0 to 27 [ 845.943267] FAT-fs (loop4): bogus number of reserved sectors [ 845.944299] FAT-fs (loop4): Can't find a valid FAT filesystem [ 845.981155] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:13:59 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) r3 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r3, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000540)=0x100000000, 0xbf) sendmsg$802154_raw(r3, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, r2, 0x0, 0xffff) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 846.029773] ieee802154 phy0 wpan0: encryption failed: -22 [ 846.159102] ieee802154 phy0 wpan0: encryption failed: -22 [ 846.178345] ieee802154 phy0 wpan0: encryption failed: -22 20:14:13 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) r3 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r3, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000540)=0x100000000, 0xbf) sendmsg$802154_raw(r3, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, r2, 0x0, 0xffff) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:14:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) 20:14:13 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 20:14:13 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) r3 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r3, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000540)=0x100000000, 0xbf) sendmsg$802154_raw(r3, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, r2, 0x0, 0xffff) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:14:13 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 20:14:13 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) 20:14:13 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, 0x0, 0x0, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:14:13 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)}}], 0x1, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 860.952151] FAT-fs (loop4): bogus number of reserved sectors [ 860.952646] FAT-fs (loop4): Can't find a valid FAT filesystem [ 860.957179] ieee802154 phy0 wpan0: encryption failed: -22 [ 860.959508] loop6: detected capacity change from 0 to 27 [ 860.960220] ieee802154 phy0 wpan0: encryption failed: -22 [ 860.965465] FAT-fs (loop3): bogus number of reserved sectors [ 860.966414] FAT-fs (loop3): Can't find a valid FAT filesystem [ 860.973495] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 860.980215] ieee802154 phy0 wpan0: encryption failed: -22 [ 860.983691] ieee802154 phy0 wpan0: encryption failed: -22 [ 860.994343] FAT-fs (loop2): bogus number of reserved sectors [ 860.995603] FAT-fs (loop2): Can't find a valid FAT filesystem [ 861.027827] ieee802154 phy0 wpan0: encryption failed: -22 [ 861.039197] ieee802154 phy0 wpan0: encryption failed: -22 20:14:14 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)}}], 0x1, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:14:14 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, 0x0, 0x0, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 861.255277] ieee802154 phy0 wpan0: encryption failed: -22 [ 861.349654] ieee802154 phy0 wpan0: encryption failed: -22 [ 861.358638] loop6: detected capacity change from 0 to 27 [ 861.377819] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:14:28 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) sendfile(r1, r0, 0x0, 0xfffffdef) 20:14:28 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, r2, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="2c666c636f6e746578743d73797361e46d5f752c00798d06942c032d7ce5a1b4f93a186f29e7a47d66df15f5eb80d9a21ae0c4902693db4de5c6f9ae45455fdeb202d8120b299c48d9f7e77f11c74f6a8b47385686f50c63f56418d4c753f6ba30210bf76822bf56a7fa202a3f7b9675ef7109fe31ab007d7c3eb8869f4924788898af05b5e4814d673ebfccceb200833983c8384c6e14a5694a9c5e494eff26669b5b314b6fa00ae9b82265db2cd670b948c6df5e257b796ca4fc25da5fe866637a82802399c099dc250e722d870215e9eba7f5f4d31dc72a3de3e825d120ca9a001dbd97e8c33f61505fc5f134775b93dced030e309c27d7854325399d738cd38089d19fd44850bd4eea3f9f8108df35286e2eb12f41640d1f42ee2fcffa02556058e4accce4a3c86fd287a565f60a5db05575de5efddcb59bf3828ba1d825050dcc4351d322353e297423b8735e80b97605aff95cd62661a018ade24f756a1a04e15de1f54b"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:14:28 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 20:14:28 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, 0x0, 0x0, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:14:28 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) r3 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r3, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000540)=0x100000000, 0xbf) sendmsg$802154_raw(r3, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, r2, 0x0, 0xffff) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:14:28 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)}}], 0x1, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:14:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) 20:14:28 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) [ 875.916575] FAT-fs (loop3): bogus number of reserved sectors [ 875.917454] FAT-fs (loop3): Can't find a valid FAT filesystem [ 875.956847] loop4: detected capacity change from 0 to 40 [ 875.972051] FAT-fs (loop2): bogus number of reserved sectors [ 875.972949] FAT-fs (loop2): Can't find a valid FAT filesystem [ 875.978134] ieee802154 phy0 wpan0: encryption failed: -22 [ 875.984439] ieee802154 phy0 wpan0: encryption failed: -22 [ 876.006797] loop6: detected capacity change from 0 to 27 [ 876.026643] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 876.033110] ieee802154 phy0 wpan0: encryption failed: -22 [ 876.045092] ieee802154 phy0 wpan0: encryption failed: -22 [ 876.073500] loop7: detected capacity change from 0 to 27 [ 876.117573] FAT-fs (loop7): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:14:29 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}], 0x1, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:14:29 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}}], 0x1, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 876.179110] syz-executor.4: attempt to access beyond end of device [ 876.179110] loop4: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 876.180597] Buffer I/O error on dev loop4, logical block 10, lost async page write [ 876.230306] ieee802154 phy0 wpan0: encryption failed: -22 [ 876.240283] ieee802154 phy0 wpan0: encryption failed: -22 [ 876.263411] loop6: detected capacity change from 0 to 27 [ 876.296261] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:14:29 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)}}], 0x1, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:14:29 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, r2, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 876.327068] ieee802154 phy0 wpan0: encryption failed: -22 20:14:29 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}], 0x1, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="2c666c636f6e746578743d73797361e46d5f752c00798d06942c032d7ce5a1b4f93a186f29e7a47d66df15f5eb80d9a21ae0c4902693db4de5c6f9ae45455fdeb202d8120b299c48d9f7e77f11c74f6a8b47385686f50c63f56418d4c753f6ba30210bf76822bf56a7fa202a3f7b9675ef7109fe31ab007d7c3eb8869f4924788898af05b5e4814d673ebfccceb200833983c8384c6e14a5694a9c5e494eff26669b5b314b6fa00ae9b82265db2cd670b948c6df5e257b796ca4fc25da5fe866637a82802399c099dc250e722d870215e9eba7f5f4d31dc72a3de3e825d120ca9a001dbd97e8c33f61505fc5f134775b93dced030e309c27d7854325399d738cd38089d19fd44850bd4eea3f9f8108df35286e2eb12f41640d1f42ee2fcffa02556058e4accce4a3c86fd287a565f60a5db05575de5efddcb59bf3828ba1d825050dcc4351d322353e297423b8735e80b97605aff95cd62661a018ade24f756a1a04e15de1f54b"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 876.411731] ieee802154 phy0 wpan0: encryption failed: -22 20:14:29 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}], 0x1, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="2c666c636f6e746578743d73797361e46d5f752c00798d06942c032d7ce5a1b4f93a186f29e7a47d66df15f5eb80d9a21ae0c4902693db4de5c6f9ae45455fdeb202d8120b299c48d9f7e77f11c74f6a8b47385686f50c63f56418d4c753f6ba30210bf76822bf56a7fa202a3f7b9675ef7109fe31ab007d7c3eb8869f4924788898af05b5e4814d673ebfccceb200833983c8384c6e14a5694a9c5e494eff26669b5b314b6fa00ae9b82265db2cd670b948c6df5e257b796ca4fc25da5fe866637a82802399c099dc250e722d870215e9eba7f5f4d31dc72a3de3e825d120ca9a001dbd97e8c33f61505fc5f134775b93dced030e309c27d7854325399d738cd38089d19fd44850bd4eea3f9f8108df35286e2eb12f41640d1f42ee2fcffa02556058e4accce4a3c86fd287a565f60a5db05575de5efddcb59bf3828ba1d825050dcc4351d322353e297423b8735e80b97605aff95cd62661a018ade24f756a1a04e15de1f54b"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:14:29 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}}], 0x1, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:14:29 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}], 0x1, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="2c666c636f6e746578743d73797361e46d5f752c00798d06942c032d7ce5a1b4f93a186f29e7a47d66df15f5eb80d9a21ae0c4902693db4de5c6f9ae45455fdeb202d8120b299c48d9f7e77f11c74f6a8b47385686f50c63f56418d4c753f6ba30210bf76822bf56a7fa202a3f7b9675ef7109fe31ab007d7c3eb8869f4924788898af05b5e4814d673ebfccceb200833983c8384c6e14a5694a9c5e494eff26669b5b314b6fa00ae9b82265db2cd670b948c6df5e257b796ca4fc25da5fe866637a82802399c099dc250e722d870215e9eba7f5f4d31dc72a3de3e825d120ca9a001dbd97e8c33f61505fc5f134775b93dced030e309c27d7854325399d738cd38089d19fd44850bd4eea3f9f8108df35286e2eb12f41640d1f42ee2fcffa02556058e4accce4a3c86fd287a565f60a5db05575de5efddcb59bf3828ba1d825050dcc4351d322353e297423b8735e80b97605aff95cd62661a018ade24f756a1a04e15de1f54b"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 876.521973] ieee802154 phy0 wpan0: encryption failed: -22 [ 876.531534] ieee802154 phy0 wpan0: encryption failed: -22 [ 876.549692] loop6: detected capacity change from 0 to 27 [ 876.572788] loop1: detected capacity change from 0 to 27 [ 876.576307] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 876.582628] FAT-fs (loop1): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 876.624449] ieee802154 phy0 wpan0: encryption failed: -22 [ 876.626201] ieee802154 phy0 wpan0: encryption failed: -22 [ 876.638751] ieee802154 phy0 wpan0: encryption failed: -22 20:14:29 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) r3 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r3, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r3, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, r2, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="2c666c636f6e746578743d73797361e46d5f752c00798d06942c032d7ce5a1b4f93a186f29e7a47d66df15f5eb80d9a21ae0c4902693db4de5c6f9ae45455fdeb202d8120b299c48d9f7e77f11c74f6a8b47385686f50c63f56418d4c753f6ba30210bf76822bf56a7fa202a3f7b9675ef7109fe31ab007d7c3eb8869f4924788898af05b5e4814d673ebfccceb200833983c8384c6e14a5694a9c5e494eff26669b5b314b6fa00ae9b82265db2cd670b948c6df5e257b796ca4fc25da5fe866637a82802399c099dc250e722d870215e9eba7f5f4d31dc72a3de3e825d120ca9a001dbd97e8c33f61505fc5f134775b93dced030e309c27d7854325399d738cd38089d19fd44850bd4eea3f9f8108df35286e2eb12f41640d1f42ee2fcffa02556058e4accce4a3c86fd287a565f60a5db05575de5efddcb59bf3828ba1d825050dcc4351d322353e297423b8735e80b97605aff95cd62661a018ade24f756a1a04e15de1f54b"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 876.655053] ieee802154 phy0 wpan0: encryption failed: -22 [ 876.656605] ieee802154 phy0 wpan0: encryption failed: -22 20:14:29 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}}], 0x1, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 876.660214] loop7: detected capacity change from 0 to 27 [ 876.664559] FAT-fs (loop7): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 876.690123] loop4: detected capacity change from 0 to 27 [ 876.719418] FAT-fs (loop4): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 876.763970] ieee802154 phy0 wpan0: encryption failed: -22 [ 876.831338] ieee802154 phy0 wpan0: encryption failed: -22 [ 876.855676] ieee802154 phy0 wpan0: encryption failed: -22 [ 876.924294] loop1: detected capacity change from 0 to 27 [ 876.935735] FAT-fs (loop1): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:14:44 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) r3 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r3, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r3, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, r2, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:14:44 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) r3 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r3, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r3, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, r2, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:14:44 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}], 0x1, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:14:44 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)}], 0x1}}], 0x1, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:14:44 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) r3 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r3, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r3, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, r2, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:14:44 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) r3 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r3, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r3, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, r2, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="2c666c636f6e746578743d73797361e46d5f752c00798d06942c032d7ce5a1b4f93a186f29e7a47d66df15f5eb80d9a21ae0c4902693db4de5c6f9ae45455fdeb202d8120b299c48d9f7e77f11c74f6a8b47385686f50c63f56418d4c753f6ba30210bf76822bf56a7fa202a3f7b9675ef7109fe31ab007d7c3eb8869f4924788898af05b5e4814d673ebfccceb200833983c8384c6e14a5694a9c5e494eff26669b5b314b6fa00ae9b82265db2cd670b948c6df5e257b796ca4fc25da5fe866637a82802399c099dc250e722d870215e9eba7f5f4d31dc72a3de3e825d120ca9a001dbd97e8c33f61505fc5f134775b93dced030e309c27d7854325399d738cd38089d19fd44850bd4eea3f9f8108df35286e2eb12f41640d1f42ee2fcffa02556058e4accce4a3c86fd287a565f60a5db05575de5efddcb59bf3828ba1d825050dcc4351d322353e297423b8735e80b97605aff95cd62661a018ade24f756a1a04e15de1f54b"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:14:44 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 20:14:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) [ 891.523065] ieee802154 phy0 wpan0: encryption failed: -22 [ 891.527231] ieee802154 phy0 wpan0: encryption failed: -22 [ 891.537276] loop4: detected capacity change from 0 to 27 [ 891.541767] FAT-fs (loop3): bogus number of reserved sectors [ 891.542332] FAT-fs (loop3): Can't find a valid FAT filesystem [ 891.544329] FAT-fs (loop4): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 891.567995] ieee802154 phy0 wpan0: encryption failed: -22 [ 891.575564] ieee802154 phy0 wpan0: encryption failed: -22 [ 891.585521] ieee802154 phy0 wpan0: encryption failed: -22 [ 891.593496] ieee802154 phy0 wpan0: encryption failed: -22 [ 891.599449] loop6: detected capacity change from 0 to 27 [ 891.612297] ieee802154 phy0 wpan0: encryption failed: -22 [ 891.613728] FAT-fs (loop2): bogus number of reserved sectors [ 891.614275] FAT-fs (loop2): Can't find a valid FAT filesystem [ 891.638722] ieee802154 phy0 wpan0: encryption failed: -22 [ 891.646049] ieee802154 phy0 wpan0: encryption failed: -22 [ 891.649807] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 891.656374] ieee802154 phy0 wpan0: encryption failed: -22 [ 891.668334] ieee802154 phy0 wpan0: encryption failed: -22 20:14:44 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)}], 0x1}}], 0x1, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:14:44 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) r3 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r3, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r3, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, r2, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 891.704338] loop1: detected capacity change from 0 to 27 [ 891.732626] loop7: detected capacity change from 0 to 27 [ 891.740269] FAT-fs (loop1): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 891.761845] FAT-fs (loop7): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:14:44 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) r3 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r3, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r3, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, r2, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 891.859451] ieee802154 phy0 wpan0: encryption failed: -22 20:14:44 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:14:44 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) [ 891.918368] ieee802154 phy0 wpan0: encryption failed: -22 [ 891.919679] ieee802154 phy0 wpan0: encryption failed: -22 [ 891.922830] ieee802154 phy0 wpan0: encryption failed: -22 [ 891.927609] loop6: detected capacity change from 0 to 27 [ 891.940813] ieee802154 phy0 wpan0: encryption failed: -22 [ 891.941479] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 891.953200] ieee802154 phy0 wpan0: encryption failed: -22 [ 892.032489] loop4: detected capacity change from 0 to 27 [ 892.050456] ieee802154 phy0 wpan0: encryption failed: -22 [ 892.053675] loop7: detected capacity change from 0 to 40 [ 892.055756] FAT-fs (loop4): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 892.059537] ieee802154 phy0 wpan0: encryption failed: -22 [ 892.294677] syz-executor.7: attempt to access beyond end of device [ 892.294677] loop7: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 892.296578] Buffer I/O error on dev loop7, logical block 10, lost async page write 20:14:57 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 20:14:57 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) r3 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r3, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000540)=0x100000000, 0xbf) sendmsg$802154_raw(r3, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, r2, 0x0, 0xffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 20:14:57 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) 20:14:57 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:14:57 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)}], 0x1}}], 0x1, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:14:57 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) r3 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r3, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000540)=0x100000000, 0xbf) sendmsg$802154_raw(r3, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, r2, 0x0, 0xffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="2c666c636f6e746578743d73797361e46d5f752c00798d06942c032d7ce5a1b4f93a186f29e7a47d66df15f5eb80d9a21ae0c4902693db4de5c6f9ae45455fdeb202d8120b299c48d9f7e77f11c74f6a8b47385686f50c63f56418d4c753f6ba30210bf76822bf56a7fa202a3f7b9675ef7109fe31ab007d7c3eb8869f4924788898af05b5e4814d673ebfccceb200833983c8384c6e14a5694a9c5e494eff26669b5b314b6fa00ae9b82265db2cd670b948c6df5e257b796ca4fc25da5fe866637a82802399c099dc250e722d870215e9eba7f5f4d31dc72a3de3e825d120ca9a001dbd97e8c33f61505fc5f134775b93dced030e309c27d7854325399d738cd38089d19fd44850bd4eea3f9f8108df35286e2eb12f41640d1f42ee2fcffa02556058e4accce4a3c86fd287a565f60a5db05575de5efddcb59bf3828ba1d825050dcc4351d322353e297423b8735e80b97605aff95cd62661a018ade24f756a1a04e15de1f54b"]) 20:14:57 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) r3 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r3, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000540)=0x100000000, 0xbf) sendmsg$802154_raw(r3, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, r2, 0x0, 0xffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 20:14:57 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) r3 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r3, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000540)=0x100000000, 0xbf) sendmsg$802154_raw(r3, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, r2, 0x0, 0xffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 904.808791] loop3: detected capacity change from 0 to 40 [ 904.827787] FAT-fs (loop2): bogus number of reserved sectors [ 904.828527] FAT-fs (loop2): Can't find a valid FAT filesystem [ 904.830311] ieee802154 phy0 wpan0: encryption failed: -22 [ 904.831472] ieee802154 phy0 wpan0: encryption failed: -22 [ 904.835176] FAT-fs (loop3): bogus number of reserved sectors [ 904.836402] FAT-fs (loop3): Can't find a valid FAT filesystem [ 904.841793] ieee802154 phy0 wpan0: encryption failed: -22 [ 904.846594] ieee802154 phy0 wpan0: encryption failed: -22 [ 904.847770] ieee802154 phy0 wpan0: encryption failed: -22 [ 904.859384] ieee802154 phy0 wpan0: encryption failed: -22 [ 904.866325] loop6: detected capacity change from 0 to 27 [ 904.886390] ieee802154 phy0 wpan0: encryption failed: -22 [ 904.889834] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 904.907687] ieee802154 phy0 wpan0: encryption failed: -22 [ 904.923056] ieee802154 phy0 wpan0: encryption failed: -22 20:14:57 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 904.949109] ieee802154 phy0 wpan0: encryption failed: -22 [ 904.949630] loop4: detected capacity change from 0 to 27 [ 904.953711] FAT-fs (loop4): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 904.959577] ieee802154 phy0 wpan0: encryption failed: -22 [ 904.961709] ieee802154 phy0 wpan0: encryption failed: -22 [ 904.969067] loop1: detected capacity change from 0 to 27 [ 904.975389] loop7: detected capacity change from 0 to 27 [ 904.982984] FAT-fs (loop1): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 904.985045] FAT-fs (loop7): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:14:58 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) r3 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r3, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000540)=0x100000000, 0xbf) sendmsg$802154_raw(r3, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, r2, 0x0, 0xffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="2c666c636f6e746578743d73797361e46d5f752c00798d06942c032d7ce5a1b4f93a186f29e7a47d66df15f5eb80d9a21ae0c4902693db4de5c6f9ae45455fdeb202d8120b299c48d9f7e77f11c74f6a8b47385686f50c63f56418d4c753f6ba30210bf76822bf56a7fa202a3f7b9675ef7109fe31ab007d7c3eb8869f4924788898af05b5e4814d673ebfccceb200833983c8384c6e14a5694a9c5e494eff26669b5b314b6fa00ae9b82265db2cd670b948c6df5e257b796ca4fc25da5fe866637a82802399c099dc250e722d870215e9eba7f5f4d31dc72a3de3e825d120ca9a001dbd97e8c33f61505fc5f134775b93dced030e309c27d7854325399d738cd38089d19fd44850bd4eea3f9f8108df35286e2eb12f41640d1f42ee2fcffa02556058e4accce4a3c86fd287a565f60a5db05575de5efddcb59bf3828ba1d825050dcc4351d322353e297423b8735e80b97605aff95cd62661a018ade24f756a1a04e15de1f54b"]) 20:14:58 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="5899", 0x2}], 0x1}}], 0x1, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 905.057757] ieee802154 phy0 wpan0: encryption failed: -22 [ 905.062211] ieee802154 phy0 wpan0: encryption failed: -22 [ 905.069832] ieee802154 phy0 wpan0: encryption failed: -22 [ 905.073990] loop6: detected capacity change from 0 to 27 [ 905.101676] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 905.107981] ieee802154 phy0 wpan0: encryption failed: -22 [ 905.119164] ieee802154 phy0 wpan0: encryption failed: -22 [ 905.128480] ieee802154 phy0 wpan0: encryption failed: -22 20:15:12 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) 20:15:12 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 20:15:12 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="5899", 0x2}], 0x1}}], 0x1, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:15:12 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) r3 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r3, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000540)=0x100000000, 0xbf) sendfile(r1, r2, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="2c666c636f6e746578743d73797361e46d5f752c00798d06942c032d7ce5a1b4f93a186f29e7a47d66df15f5eb80d9a21ae0c4902693db4de5c6f9ae45455fdeb202d8120b299c48d9f7e77f11c74f6a8b47385686f50c63f56418d4c753f6ba30210bf76822bf56a7fa202a3f7b9675ef7109fe31ab007d7c3eb8869f4924788898af05b5e4814d673ebfccceb200833983c8384c6e14a5694a9c5e494eff26669b5b314b6fa00ae9b82265db2cd670b948c6df5e257b796ca4fc25da5fe866637a82802399c099dc250e722d870215e9eba7f5f4d31dc72a3de3e825d120ca9a001dbd97e8c33f61505fc5f134775b93dced030e309c27d7854325399d738cd38089d19fd44850bd4eea3f9f8108df35286e2eb12f41640d1f42ee2fcffa02556058e4accce4a3c86fd287a565f60a5db05575de5efddcb59bf3828ba1d825050dcc4351d322353e297423b8735e80b97605aff95cd62661a018ade24f756a1a04e15de1f54b"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:15:12 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) r3 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r3, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000540)=0x100000000, 0xbf) sendfile(r1, r2, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:15:12 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 20:15:12 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:15:12 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 919.667470] ieee802154 phy0 wpan0: encryption failed: -22 [ 919.674220] FAT-fs (loop7): bogus number of reserved sectors [ 919.675416] FAT-fs (loop7): Can't find a valid FAT filesystem [ 919.675656] ieee802154 phy0 wpan0: encryption failed: -22 [ 919.678235] ieee802154 phy0 wpan0: encryption failed: -22 [ 919.679590] ieee802154 phy0 wpan0: encryption failed: -22 [ 919.683159] ieee802154 phy0 wpan0: encryption failed: -22 [ 919.684170] loop1: detected capacity change from 0 to 27 [ 919.687290] FAT-fs (loop1): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 919.689924] loop3: detected capacity change from 0 to 40 [ 919.691298] loop2: detected capacity change from 0 to 40 [ 919.696132] ieee802154 phy0 wpan0: encryption failed: -22 [ 919.696587] ieee802154 phy0 wpan0: encryption failed: -22 [ 919.698375] FAT-fs (loop2): bogus number of reserved sectors [ 919.698775] FAT-fs (loop2): Can't find a valid FAT filesystem [ 919.702447] loop6: detected capacity change from 0 to 27 [ 919.706289] ieee802154 phy0 wpan0: encryption failed: -22 [ 919.717552] ieee802154 phy0 wpan0: encryption failed: -22 [ 919.728814] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 919.737228] FAT-fs (loop3): bogus number of reserved sectors [ 919.738305] FAT-fs (loop3): Can't find a valid FAT filesystem [ 919.795339] loop4: detected capacity change from 0 to 27 [ 919.797804] FAT-fs (loop4): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:15:12 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) r3 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r3, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000540)=0x100000000, 0xbf) sendfile(r1, r2, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="2c666c636f6e746578743d73797361e46d5f752c00798d06942c032d7ce5a1b4f93a186f29e7a47d66df15f5eb80d9a21ae0c4902693db4de5c6f9ae45455fdeb202d8120b299c48d9f7e77f11c74f6a8b47385686f50c63f56418d4c753f6ba30210bf76822bf56a7fa202a3f7b9675ef7109fe31ab007d7c3eb8869f4924788898af05b5e4814d673ebfccceb200833983c8384c6e14a5694a9c5e494eff26669b5b314b6fa00ae9b82265db2cd670b948c6df5e257b796ca4fc25da5fe866637a82802399c099dc250e722d870215e9eba7f5f4d31dc72a3de3e825d120ca9a001dbd97e8c33f61505fc5f134775b93dced030e309c27d7854325399d738cd38089d19fd44850bd4eea3f9f8108df35286e2eb12f41640d1f42ee2fcffa02556058e4accce4a3c86fd287a565f60a5db05575de5efddcb59bf3828ba1d825050dcc4351d322353e297423b8735e80b97605aff95cd62661a018ade24f756a1a04e15de1f54b"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:15:12 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 20:15:12 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="5899", 0x2}], 0x1}}], 0x1, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 919.898462] ieee802154 phy0 wpan0: encryption failed: -22 [ 919.901979] ieee802154 phy0 wpan0: encryption failed: -22 20:15:12 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:15:12 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 919.970439] loop1: detected capacity change from 0 to 27 [ 919.975423] FAT-fs (loop1): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 920.008015] ieee802154 phy0 wpan0: encryption failed: -22 [ 920.008682] ieee802154 phy0 wpan0: encryption failed: -22 20:15:13 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}], 0x1, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, 0x0) [ 920.024261] ieee802154 phy0 wpan0: encryption failed: -22 [ 920.033055] loop6: detected capacity change from 0 to 27 [ 920.049792] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 920.082023] ieee802154 phy0 wpan0: encryption failed: -22 [ 920.082556] ieee802154 phy0 wpan0: encryption failed: -22 [ 920.096285] ieee802154 phy0 wpan0: encryption failed: -22 [ 920.100641] loop4: detected capacity change from 0 to 27 [ 920.109777] FAT-fs (loop4): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:15:13 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) r3 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r3, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000540)=0x100000000, 0xbf) sendmsg$802154_raw(r3, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, r2, 0x0, 0xffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 920.132142] ieee802154 phy0 wpan0: encryption failed: -22 20:15:13 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 920.220080] ieee802154 phy0 wpan0: encryption failed: -22 [ 920.222727] ieee802154 phy0 wpan0: encryption failed: -22 [ 920.251066] ieee802154 phy0 wpan0: encryption failed: -22 [ 920.251536] ieee802154 phy0 wpan0: encryption failed: -22 [ 920.257230] ieee802154 phy0 wpan0: encryption failed: -22 [ 920.258691] loop6: detected capacity change from 0 to 27 [ 920.262117] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 920.263441] loop1: detected capacity change from 0 to 27 [ 920.279513] FAT-fs (loop1): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:15:27 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 20:15:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 20:15:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) 20:15:27 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="2c666c636f6e746578743d73797361e46d5f752c00798d06942c032d7ce5a1b4f93a186f29e7a47d66df15f5eb80d9a21ae0c4902693db4de5c6f9ae45455fdeb202d8120b299c48d9f7e77f11c74f6a8b47385686f50c63f56418d4c753f6ba30210bf76822bf56a7fa202a3f7b9675ef7109fe31ab007d7c3eb8869f4924788898af05b5e4814d673ebfccceb200833983c8384c6e14a5694a9c5e494eff26669b5b314b6fa00ae9b82265db2cd670b948c6df5e257b796ca4fc25da5fe866637a82802399c099dc250e722d870215e9eba7f5f4d31dc72a3de3e825d120ca9a001dbd97e8c33f61505fc5f134775b93dced030e309c27d7854325399d738cd38089d19fd44850bd4eea3f9f8108df35286e2eb12f41640d1f42ee2fcffa02556058e4accce4a3c86fd287a565f60a5db05575de5efddcb59bf3828ba1d825050dcc4351d322353e297423b8735e80b97605aff95cd62661a018ade24f756a1a04e15de1f54b"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 934.875413] loop2: detected capacity change from 0 to 40 20:15:27 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}], 0x1, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, 0x0) 20:15:27 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:15:27 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) r3 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r3, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000540)=0x100000000, 0xbf) sendfile(r1, r2, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:15:27 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) [ 934.886719] FAT-fs (loop2): bogus number of reserved sectors [ 934.887261] FAT-fs (loop2): Can't find a valid FAT filesystem [ 934.888459] loop3: detected capacity change from 0 to 40 [ 934.892657] FAT-fs (loop3): bogus number of reserved sectors [ 934.893156] FAT-fs (loop3): Can't find a valid FAT filesystem [ 934.913087] ieee802154 phy0 wpan0: encryption failed: -22 [ 934.939883] loop4: detected capacity change from 0 to 40 [ 934.969584] ieee802154 phy0 wpan0: encryption failed: -22 [ 934.971013] ieee802154 phy0 wpan0: encryption failed: -22 [ 934.973108] ieee802154 phy0 wpan0: encryption failed: -22 [ 935.004393] loop7: detected capacity change from 0 to 27 [ 935.009487] ieee802154 phy0 wpan0: encryption failed: -22 [ 935.017527] loop6: detected capacity change from 0 to 27 [ 935.025187] ieee802154 phy0 wpan0: encryption failed: -22 [ 935.029821] FAT-fs (loop7): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 935.034395] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 935.048749] ieee802154 phy0 wpan0: encryption failed: -22 [ 935.069515] ieee802154 phy0 wpan0: encryption failed: -22 20:15:28 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}], 0x1, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, 0x0) [ 935.090470] loop1: detected capacity change from 0 to 27 20:15:28 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 935.145251] FAT-fs (loop1): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 935.190509] syz-executor.4: attempt to access beyond end of device [ 935.190509] loop4: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 935.192329] Buffer I/O error on dev loop4, logical block 10, lost async page write [ 935.250110] ieee802154 phy0 wpan0: encryption failed: -22 [ 935.251239] ieee802154 phy0 wpan0: encryption failed: -22 [ 935.258736] ieee802154 phy0 wpan0: encryption failed: -22 [ 935.268810] loop6: detected capacity change from 0 to 27 [ 935.283793] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 935.324827] ieee802154 phy0 wpan0: encryption failed: -22 20:15:28 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) r3 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r3, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000540)=0x100000000, 0xbf) sendmsg$802154_raw(r3, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, r2, 0x0, 0xffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 20:15:28 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:15:28 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 935.488829] ieee802154 phy0 wpan0: encryption failed: -22 [ 935.505412] ieee802154 phy0 wpan0: encryption failed: -22 [ 935.548038] loop7: detected capacity change from 0 to 27 20:15:28 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="2c666c636f6e746578743d73797361e46d5f752c00798d06942c032d7ce5a1b4f93a186f29e7a47d66df15f5eb80d9a21ae0c4902693db4de5c6f9ae45455fdeb202d8120b299c48d9f7e77f11c74f6a8b47385686f50c63f56418d4c753f6ba30210bf76822bf56a7fa202a3f7b9675ef7109fe31ab007d7c3eb8869f4924788898af05b5e4814d673ebfccceb200833983c8384c6e14a5694a9c5e494eff26669b5b314b6fa00ae9b82265db2cd670b948c6df5e257b796ca4fc25da5fe866637a82802399c099dc250e722d870215e9eba7f5f4d31dc72a3de3e825d120ca9a001dbd97e8c33f61505fc5f134775b93dced030e309c27d7854325399d738cd38089d19fd44850bd4eea3f9f8108df35286e2eb12f41640d1f42ee2fcffa02556058e4accce4a3c86fd287a565f60a5db05575de5efddcb59bf3828ba1d825050dcc4351d322353e297423b8735e80b97605aff95cd62661a018ade24f756a1a04e15de1f54b"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 935.554524] FAT-fs (loop7): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 935.559571] ieee802154 phy0 wpan0: encryption failed: -22 [ 935.560539] ieee802154 phy0 wpan0: encryption failed: -22 [ 935.561326] ieee802154 phy0 wpan0: encryption failed: -22 [ 935.562251] ieee802154 phy0 wpan0: encryption failed: -22 [ 935.570526] loop1: detected capacity change from 0 to 27 [ 935.573578] ieee802154 phy0 wpan0: encryption failed: -22 [ 935.585446] ieee802154 phy0 wpan0: encryption failed: -22 [ 935.591661] FAT-fs (loop1): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 935.615457] loop6: detected capacity change from 0 to 27 [ 935.649815] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 935.716019] ieee802154 phy0 wpan0: encryption failed: -22 [ 935.717324] ieee802154 phy0 wpan0: encryption failed: -22 20:15:28 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) r3 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r3, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000540)=0x100000000, 0xbf) sendmsg$802154_raw(r3, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, r2, 0x0, 0xffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 20:15:28 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2402, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0xfffffffffffffff8, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x9, 0x1, 0x7f, 0x6, 0x0, 0x3c8000, 0x4, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x40000000001f, 0xffffffffffffffff}, 0x20c0, 0xfffffffffffffffd, 0xcad, 0x7, 0x4, 0x1, 0x7, 0x0, 0x80000001, 0x0, 0x1}, r1, 0xd, r0, 0x1) creat(&(0x7f0000000180)='./file0\x00', 0xe) [ 935.746833] ieee802154 phy0 wpan0: encryption failed: -22 [ 935.762793] loop4: detected capacity change from 0 to 27 [ 935.787188] ieee802154 phy0 wpan0: encryption failed: -22 [ 935.801286] FAT-fs (loop4): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 935.808386] ieee802154 phy0 wpan0: encryption failed: -22 [ 935.840670] loop5: detected capacity change from 0 to 27 [ 935.852669] FAT-fs (loop5): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:15:43 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000000540)=0x100000000, 0xbf) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:15:43 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000000540)=0x100000000, 0xbf) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:15:43 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 20:15:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) 20:15:43 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:15:43 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 20:15:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 20:15:43 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2402, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0xfffffffffffffff8, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x9, 0x1, 0x7f, 0x6, 0x0, 0x3c8000, 0x4, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x40000000001f, 0xffffffffffffffff}, 0x20c0, 0xfffffffffffffffd, 0xcad, 0x7, 0x4, 0x1, 0x7, 0x0, 0x80000001, 0x0, 0x1}, r1, 0xd, r0, 0x1) creat(&(0x7f0000000180)='./file0\x00', 0xe) [ 950.042686] ieee802154 phy0 wpan0: encryption failed: -22 [ 950.047801] ieee802154 phy0 wpan0: encryption failed: -22 [ 950.051323] ieee802154 phy0 wpan0: encryption failed: -22 [ 950.054451] loop3: detected capacity change from 0 to 40 [ 950.058820] FAT-fs (loop3): bogus number of reserved sectors [ 950.059304] FAT-fs (loop3): Can't find a valid FAT filesystem [ 950.059691] loop4: detected capacity change from 0 to 40 [ 950.063070] loop6: detected capacity change from 0 to 27 [ 950.064061] ieee802154 phy0 wpan0: encryption failed: -22 [ 950.068262] ieee802154 phy0 wpan0: encryption failed: -22 [ 950.073361] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 950.075255] loop5: detected capacity change from 0 to 27 [ 950.078414] FAT-fs (loop5): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 950.100662] loop2: detected capacity change from 0 to 40 [ 950.127404] FAT-fs (loop2): bogus number of reserved sectors [ 950.128293] FAT-fs (loop2): Can't find a valid FAT filesystem [ 950.146046] ieee802154 phy0 wpan0: encryption failed: -22 [ 950.151552] ieee802154 phy0 wpan0: encryption failed: -22 20:15:43 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 950.200421] loop1: detected capacity change from 0 to 27 [ 950.256767] FAT-fs (loop1): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:15:43 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) 20:15:43 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2402, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0xfffffffffffffff8, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x9, 0x1, 0x7f, 0x6, 0x0, 0x3c8000, 0x4, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x40000000001f, 0xffffffffffffffff}, 0x20c0, 0xfffffffffffffffd, 0xcad, 0x7, 0x4, 0x1, 0x7, 0x0, 0x80000001, 0x0, 0x1}, r1, 0xd, r0, 0x1) creat(&(0x7f0000000180)='./file0\x00', 0xe) [ 950.326586] syz-executor.4: attempt to access beyond end of device [ 950.326586] loop4: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 950.328550] Buffer I/O error on dev loop4, logical block 10, lost async page write [ 950.438119] ieee802154 phy0 wpan0: encryption failed: -22 [ 950.446975] ieee802154 phy0 wpan0: encryption failed: -22 [ 950.451488] ieee802154 phy0 wpan0: encryption failed: -22 [ 950.468482] loop6: detected capacity change from 0 to 27 [ 950.479349] loop5: detected capacity change from 0 to 40 [ 950.491576] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:15:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) 20:15:43 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="2c666c636f6e746578743d73797361e46d5f752c00798d06942c032d7ce5a1b4f93a186f29e7a47d66df15f5eb80d9a21ae0c4902693db4de5c6f9ae45455fdeb202d8120b299c48d9f7e77f11c74f6a8b47385686f50c63f56418d4c753f6ba30210bf76822bf56a7fa202a3f7b9675ef7109fe31ab007d7c3eb8869f4924788898af05b5e4814d673ebfccceb200833983c8384c6e14a5694a9c5e494eff26669b5b314b6fa00ae9b82265db2cd670b948c6df5e257b796ca4fc25da5fe866637a82802399c099dc250e722d870215e9eba7f5f4d31dc72a3de3e825d120ca9a001dbd97e8c33f61505fc5f134775b93dced030e309c27d7854325399d738cd38089d19fd44850bd4eea3f9f8108df35286e2eb12f41640d1f42ee2fcffa02556058e4accce4a3c86fd287a565f60a5db05575de5efddcb59bf3828ba1d825050dcc4351d322353e297423b8735e80b97605aff95cd62661a018ade24f756a1a04e15de1f54b"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:15:43 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2402, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0xfffffffffffffff8, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() creat(&(0x7f0000000180)='./file0\x00', 0xe) 20:15:43 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) r3 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r3, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000540)=0x100000000, 0xbf) sendmsg$802154_raw(r3, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, r2, 0x0, 0xffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 950.774584] loop1: detected capacity change from 0 to 40 [ 950.801708] syz-executor.5: attempt to access beyond end of device [ 950.801708] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 950.803811] Buffer I/O error on dev loop5, logical block 10, lost async page write [ 950.827578] ieee802154 phy0 wpan0: encryption failed: -22 [ 950.838728] ieee802154 phy0 wpan0: encryption failed: -22 [ 950.852132] ieee802154 phy0 wpan0: encryption failed: -22 [ 950.878702] loop6: detected capacity change from 0 to 27 [ 950.928212] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 950.939125] ieee802154 phy0 wpan0: encryption failed: -22 [ 950.959438] ieee802154 phy0 wpan0: encryption failed: -22 20:15:43 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2402, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0xfffffffffffffff8, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0xe) [ 951.025842] loop4: detected capacity change from 0 to 27 [ 951.038231] syz-executor.1: attempt to access beyond end of device [ 951.038231] loop1: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 951.040162] Buffer I/O error on dev loop1, logical block 10, lost async page write 20:15:44 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) r3 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r3, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000540)=0x100000000, 0xbf) sendmsg$802154_raw(r3, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, r2, 0x0, 0xffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 951.049758] FAT-fs (loop4): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:15:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) [ 951.168092] loop3: detected capacity change from 0 to 40 [ 951.184553] FAT-fs (loop3): bogus number of reserved sectors [ 951.185410] FAT-fs (loop3): Can't find a valid FAT filesystem [ 951.235675] ieee802154 phy0 wpan0: encryption failed: -22 [ 951.245690] ieee802154 phy0 wpan0: encryption failed: -22 [ 951.291460] loop5: detected capacity change from 0 to 27 [ 951.301614] FAT-fs (loop5): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:15:57 executing program 7: creat(&(0x7f0000000180)='./file0\x00', 0xe) 20:15:57 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73f", 0x40}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:15:57 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 20:15:57 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) 20:15:57 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) r3 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r3, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000540)=0x100000000, 0xbf) sendmsg$802154_raw(r3, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, r2, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:15:57 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) r3 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r3, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000540)=0x100000000, 0xbf) sendmsg$802154_raw(r3, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, r2, 0x0, 0xffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:15:57 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) r3 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r3, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000540)=0x100000000, 0xbf) sendmsg$802154_raw(r3, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, r2, 0x0, 0xffff) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="2c666c636f6e746578743d73797361e46d5f752c00798d06942c032d7ce5a1b4f93a186f29e7a47d66df15f5eb80d9a21ae0c4902693db4de5c6f9ae45455fdeb202d8120b299c48d9f7e77f11c74f6a8b47385686f50c63f56418d4c753f6ba30210bf76822bf56a7fa202a3f7b9675ef7109fe31ab007d7c3eb8869f4924788898af05b5e4814d673ebfccceb200833983c8384c6e14a5694a9c5e494eff26669b5b314b6fa00ae9b82265db2cd670b948c6df5e257b796ca4fc25da5fe866637a82802399c099dc250e722d870215e9eba7f5f4d31dc72a3de3e825d120ca9a001dbd97e8c33f61505fc5f134775b93dced030e309c27d7854325399d738cd38089d19fd44850bd4eea3f9f8108df35286e2eb12f41640d1f42ee2fcffa02556058e4accce4a3c86fd287a565f60a5db05575de5efddcb59bf3828ba1d825050dcc4351d322353e297423b8735e80b97605aff95cd62661a018ade24f756a1a04e15de1f54b"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:15:57 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) r3 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r3, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000540)=0x100000000, 0xbf) sendmsg$802154_raw(r3, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, r2, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 964.350324] loop3: detected capacity change from 0 to 40 [ 964.354177] FAT-fs (loop3): bogus number of reserved sectors [ 964.354635] FAT-fs (loop3): Can't find a valid FAT filesystem 20:15:57 executing program 7: creat(&(0x7f0000000180)='./file0\x00', 0xe) [ 964.376607] ieee802154 phy0 wpan0: encryption failed: -22 [ 964.383512] ieee802154 phy0 wpan0: encryption failed: -22 [ 964.387199] ieee802154 phy0 wpan0: encryption failed: -22 [ 964.392342] ieee802154 phy0 wpan0: encryption failed: -22 [ 964.394374] loop6: detected capacity change from 0 to 27 [ 964.395338] ieee802154 phy0 wpan0: encryption failed: -22 [ 964.400066] loop2: detected capacity change from 0 to 40 [ 964.404759] FAT-fs (loop2): bogus number of reserved sectors [ 964.405307] FAT-fs (loop2): Can't find a valid FAT filesystem [ 964.411452] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 964.412471] ieee802154 phy0 wpan0: encryption failed: -22 [ 964.431471] ieee802154 phy0 wpan0: encryption failed: -22 [ 964.436687] ieee802154 phy0 wpan0: encryption failed: -22 [ 964.457156] ieee802154 phy0 wpan0: encryption failed: -22 [ 964.468592] loop4: detected capacity change from 0 to 27 [ 964.476296] FAT-fs (loop4): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 964.484567] ieee802154 phy0 wpan0: encryption failed: -22 [ 964.494701] loop1: detected capacity change from 0 to 27 [ 964.505366] ieee802154 phy0 wpan0: encryption failed: -22 20:15:57 executing program 7: creat(&(0x7f0000000180)='./file0\x00', 0xe) [ 964.535469] FAT-fs (loop1): Unrecognized mount option "flcontext=sysaäm_u" or missing value 20:15:57 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) r3 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r3, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000540)=0x100000000, 0xbf) sendmsg$802154_raw(r3, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, r2, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:15:57 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) r3 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r3, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000540)=0x100000000, 0xbf) sendmsg$802154_raw(r3, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, r2, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:15:57 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73f", 0x40}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 964.681383] ieee802154 phy0 wpan0: encryption failed: -22 [ 964.684624] ieee802154 phy0 wpan0: encryption failed: -22 [ 964.698966] ieee802154 phy0 wpan0: encryption failed: -22 [ 964.702705] ieee802154 phy0 wpan0: encryption failed: -22 20:15:57 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) r3 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r3, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000540)=0x100000000, 0xbf) sendmsg$802154_raw(r3, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, r2, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 964.738129] ieee802154 phy0 wpan0: encryption failed: -22 [ 964.739350] ieee802154 phy0 wpan0: encryption failed: -22 [ 964.775115] ieee802154 phy0 wpan0: encryption failed: -22 [ 964.806148] loop6: detected capacity change from 0 to 27 [ 964.842531] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 964.969322] ieee802154 phy0 wpan0: encryption failed: -22 [ 964.978141] ieee802154 phy0 wpan0: encryption failed: -22 20:16:11 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) (fail_nth: 1) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:16:11 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) r3 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r3, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a1782effe9e1148ec82b1a032cb21307ffabaffd8428624e0d081def6dce3761b", 0x80}], 0x1}}], 0x2, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000540)=0x100000000, 0xbf) sendmsg$802154_raw(r3, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, r2, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:16:11 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 20:16:11 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) 20:16:11 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0xe) 20:16:11 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73f", 0x40}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:16:11 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0xe) (fail_nth: 1) 20:16:11 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}], 0x1, 0x0) (fail_nth: 1) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 978.918254] loop3: detected capacity change from 0 to 40 [ 978.944202] ieee802154 phy0 wpan0: encryption failed: -22 [ 978.944771] FAT-fs (loop3): bogus number of reserved sectors [ 978.945994] FAT-fs (loop3): Can't find a valid FAT filesystem [ 978.946341] FAULT_INJECTION: forcing a failure. [ 978.946341] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 978.948838] CPU: 0 PID: 6814 Comm: syz-executor.1 Not tainted 6.0.0-rc1-next-20220818 #1 [ 978.950073] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1521 [ 978.951322] in_atomic(): 0, irqs_disabled(): 1, non_block: 0, pid: 6814, name: syz-executor.1 [ 978.952475] preempt_count: 0, expected: 0 [ 978.953048] RCU nest depth: 0, expected: 0 [ 978.953615] no locks held by syz-executor.1/6814. [ 978.954293] irq event stamp: 1202 [ 978.954774] hardirqs last enabled at (1201): [] __up_console_sem+0x78/0x80 [ 978.955938] hardirqs last disabled at (1202): [] dump_stack_lvl+0x2e/0xb3 [ 978.957033] softirqs last enabled at (1194): [] __irq_exit_rcu+0x11b/0x180 [ 978.958175] softirqs last disabled at (1141): [] __irq_exit_rcu+0x11b/0x180 [ 978.959153] loop2: detected capacity change from 0 to 40 [ 978.959283] CPU: 0 PID: 6814 Comm: syz-executor.1 Not tainted 6.0.0-rc1-next-20220818 #1 [ 978.973103] ieee802154 phy0 wpan0: encryption failed: -22 [ 978.979098] ieee802154 phy0 wpan0: encryption failed: -22 [ 978.981983] FAT-fs (loop2): bogus number of reserved sectors [ 978.983057] FAT-fs (loop2): Can't find a valid FAT filesystem [ 978.983064] syz-executor.1[6814] cmdline: /syz-executor.1 exec [ 978.985144] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 978.987003] Call Trace: [ 978.987076] FAULT_INJECTION: forcing a failure. [ 978.987076] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 978.987401] [ 978.987418] dump_stack_lvl+0x8b/0xb3 [ 978.990213] __might_resched.cold+0x222/0x26b [ 978.991059] down_read_killable+0x75/0x490 [ 978.991725] ? down_read_interruptible+0x490/0x490 [ 978.992643] __access_remote_vm+0xac/0x6f0 [ 978.993483] ? follow_phys+0x2c0/0x2c0 [ 978.994273] ? do_raw_spin_lock+0x121/0x260 [ 978.995111] ? rwlock_bug.part.0+0x90/0x90 [ 978.995773] ? lock_release+0x3b2/0x750 [ 978.996543] ? __up_console_sem+0x47/0x80 [ 978.997385] get_mm_cmdline.part.0+0x214/0x600 [ 978.998262] ? dname_to_vma_addr.isra.0+0x360/0x360 [ 978.999190] ? _raw_spin_unlock_irqrestore+0x33/0x60 [ 979.000155] get_task_cmdline_kernel+0x1e9/0x230 [ 979.001045] dump_stack_print_cmdline.part.0+0x82/0x150 [ 979.002028] ? _atomic_dec_and_lock_irqsave+0x150/0x150 [ 979.002841] ? __wake_up_klogd.part.0+0xc5/0xf0 [ 979.003817] ? dump_stack_print_info+0xc6/0x190 [ 979.004708] dump_stack_print_info+0x185/0x190 [ 979.005556] dump_stack_lvl+0x7f/0xb3 [ 979.006320] should_fail.cold+0x5/0xa [ 979.007070] _copy_from_user+0x2a/0x170 [ 979.007686] copy_msghdr_from_user+0x89/0x150 [ 979.008546] ? __copy_msghdr+0x4b0/0x4b0 [ 979.009350] ? __lock_acquire+0xbad/0x5e70 [ 979.010186] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 979.011184] ___sys_sendmsg+0xdd/0x1b0 [ 979.011806] ? __ia32_sys_recvmmsg+0x260/0x260 [ 979.012670] ? lock_release+0x3b2/0x750 [ 979.013442] ? __fget_files+0x24e/0x450 [ 979.014222] ? lock_downgrade+0x6d0/0x6d0 [ 979.015038] ? __fget_files+0x270/0x450 [ 979.015660] ? __fget_light+0xe5/0x280 [ 979.016427] __sys_sendmmsg+0x18b/0x460 [ 979.017212] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 979.018039] ? perf_trace_run_bpf_submit+0xf5/0x1d0 [ 979.018817] ? syscall_enter_from_user_mode+0x18/0x50 [ 979.019760] ? perf_trace_run_bpf_submit+0xf5/0x1d0 [ 979.020686] ? perf_trace_preemptirq_template+0x274/0x420 [ 979.021697] ? __traceiter_irq_enable+0xa0/0xa0 [ 979.022585] ? syscall_enter_from_user_mode+0x1d/0x50 [ 979.023544] __x64_sys_sendmmsg+0x99/0x100 [ 979.024354] ? syscall_enter_from_user_mode+0x1d/0x50 [ 979.025294] do_syscall_64+0x3b/0x90 [ 979.026080] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 979.027077] RIP: 0033:0x7fec42a39b19 [ 979.027637] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 979.030476] RSP: 002b:00007fec3ffaf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 979.031769] RAX: ffffffffffffffda RBX: 00007fec42b4cf60 RCX: 00007fec42a39b19 [ 979.033004] RDX: 0000000000000001 RSI: 0000000020000500 RDI: 0000000000000006 [ 979.034266] RBP: 00007fec3ffaf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 979.035484] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 979.036706] R13: 00007ffed376b27f R14: 00007fec3ffaf300 R15: 0000000000022000 [ 979.038012] [ 979.044052] loop6: detected capacity change from 0 to 27 [ 979.074447] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 979.077166] ieee802154 phy0 wpan0: encryption failed: -22 [ 979.088663] ieee802154 phy0 wpan0: encryption failed: -22 20:16:12 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0xe) 20:16:12 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0xe) (fail_nth: 2) 20:16:12 executing program 4: syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001800), 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB='fmask=0']) (fail_nth: 1) 20:16:12 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0xe) [ 979.533564] syz-executor.1[6814] cmdline: /syz-executor.1 exec [ 979.534667] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 979.536423] Call Trace: [ 979.536806] [ 979.537348] dump_stack_lvl+0x8b/0xb3 [ 979.538105] should_fail.cold+0x5/0xa [ 979.538681] _copy_from_user+0x2a/0x170 [ 979.539425] copy_msghdr_from_user+0x89/0x150 [ 979.540231] ? __copy_msghdr+0x4b0/0x4b0 [ 979.540977] ? __lock_acquire+0xbad/0x5e70 [ 979.541598] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 979.542577] ___sys_sendmsg+0xdd/0x1b0 [ 979.543320] ? __ia32_sys_recvmmsg+0x260/0x260 [ 979.544204] ? lock_release+0x3b2/0x750 [ 979.544832] ? __fget_files+0x24e/0x450 [ 979.545631] ? lock_downgrade+0x6d0/0x6d0 [ 979.546494] ? __fget_files+0x270/0x450 [ 979.547272] ? __fget_light+0xe5/0x280 [ 979.548044] __sys_sendmmsg+0x18b/0x460 [ 979.548667] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 979.549519] ? perf_trace_run_bpf_submit+0xf5/0x1d0 [ 979.550461] ? syscall_enter_from_user_mode+0x18/0x50 [ 979.551429] ? perf_trace_run_bpf_submit+0xf5/0x1d0 [ 979.552385] ? perf_trace_preemptirq_template+0x274/0x420 [ 979.553385] ? __traceiter_irq_enable+0xa0/0xa0 [ 979.554341] ? syscall_enter_from_user_mode+0x1d/0x50 [ 979.555306] __x64_sys_sendmmsg+0x99/0x100 [ 979.556128] ? syscall_enter_from_user_mode+0x1d/0x50 [ 979.557068] do_syscall_64+0x3b/0x90 [ 979.557670] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 979.558636] RIP: 0033:0x7fec42a39b19 [ 979.559373] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 979.562262] RSP: 002b:00007fec3ffaf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 979.563579] RAX: ffffffffffffffda RBX: 00007fec42b4cf60 RCX: 00007fec42a39b19 [ 979.564782] RDX: 0000000000000001 RSI: 0000000020000500 RDI: 0000000000000006 [ 979.566018] RBP: 00007fec3ffaf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 979.567248] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 979.568489] R13: 00007ffed376b27f R14: 00007fec3ffaf300 R15: 0000000000022000 [ 979.569741] [ 979.570262] CPU: 1 PID: 6820 Comm: syz-executor.5 Tainted: G W 6.0.0-rc1-next-20220818 #1 [ 979.572107] syz-executor.5[6820] cmdline: /syz-executor.5 exec [ 979.573041] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 979.574639] Call Trace: [ 979.575129] [ 979.575452] dump_stack_lvl+0x8b/0xb3 [ 979.576124] should_fail.cold+0x5/0xa [ 979.576668] _copy_from_user+0x2a/0x170 [ 979.577345] copy_msghdr_from_user+0x89/0x150 [ 979.578134] ? __copy_msghdr+0x4b0/0x4b0 [ 979.578719] ? __lock_acquire+0xbad/0x5e70 [ 979.579428] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 979.580312] ___sys_sendmsg+0xdd/0x1b0 [ 979.581013] ? __ia32_sys_recvmmsg+0x260/0x260 [ 979.581671] ? lock_release+0x3b2/0x750 [ 979.582382] ? __fget_files+0x24e/0x450 [ 979.583079] ? lock_downgrade+0x6d0/0x6d0 [ 979.583670] ? lock_is_held_type+0xd7/0x130 [ 979.584422] ? __fget_files+0x270/0x450 [ 979.585122] ? __fget_light+0xe5/0x280 [ 979.585692] __sys_sendmmsg+0x18b/0x460 [ 979.586408] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 979.587163] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 979.588162] ? bit_wait_io_timeout+0x170/0x170 [ 979.589039] ? syscall_enter_from_user_mode+0x18/0x50 [ 979.589761] ? perf_trace_preemptirq_template+0xa2/0x420 [ 979.590662] ? __traceiter_irq_enable+0xa0/0xa0 [ 979.591690] ? syscall_enter_from_user_mode+0x1d/0x50 [ 979.592646] __x64_sys_sendmmsg+0x99/0x100 [ 979.593480] ? syscall_enter_from_user_mode+0x1d/0x50 [ 979.594345] do_syscall_64+0x3b/0x90 [ 979.595024] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 979.595986] RIP: 0033:0x7f228147eb19 [ 979.596519] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 979.599383] RSP: 002b:00007f227e9f4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 979.600654] RAX: ffffffffffffffda RBX: 00007f2281591f60 RCX: 00007f228147eb19 [ 979.601765] RDX: 0000000000000001 RSI: 0000000020000500 RDI: 0000000000000006 [ 979.602965] RBP: 00007f227e9f41d0 R08: 0000000000000000 R09: 0000000000000000 [ 979.604182] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 979.605376] R13: 00007ffff1e0ff6f R14: 00007f227e9f4300 R15: 0000000000022000 [ 979.606648] 20:16:12 executing program 4: syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001800), 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB='fmask=0']) (fail_nth: 2) 20:16:12 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r2, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="730ba6f5889f95442364b9040a6a556ed110e076bddffae8ed3f054c5517c990d5d94ddb3009dc9e3ba645d19def6ae0af7997c32d65e0fe3fe0b70c776ff73ffc5cb6e1b565c2e9cca1e617124d962c97415356a4ef58ea9a0ad23f6429397a", 0x60}], 0x1}}], 0x2, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14, &(0x7f0000000600)={&(0x7f00000005c0)="d2ad1254f57b", 0x6}}, 0x8000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000680)=ANY=[@ANYBLOB='rodir,nonumtail=0,iocharset=koi8-u,uid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:16:12 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="58998a", 0x3}], 0x1}}], 0x1, 0x0) (fail_nth: 2) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 20:16:12 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0xe) (fail_nth: 3) 20:16:12 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) (fail_nth: 2) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 979.811563] FAT-fs (loop4): bogus number of reserved sectors [ 979.812702] FAT-fs (loop4): Can't find a valid FAT filesystem [ 979.861541] ieee802154 phy0 wpan0: encryption failed: -22 [ 979.862323] FAULT_INJECTION: forcing a failure. [ 979.862323] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 979.864052] CPU: 0 PID: 6844 Comm: syz-executor.0 Tainted: G W 6.0.0-rc1-next-20220818 #1 [ 979.875035] syz-executor.0[6844] cmdline: /syz-executor.0 exec [ 979.876090] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 979.876562] ieee802154 phy0 wpan0: encryption failed: -22 [ 979.877602] Call Trace: [ 979.877616] [ 979.877628] dump_stack_lvl+0x8b/0xb3 [ 979.877671] should_fail.cold+0x5/0xa [ 979.877708] strncpy_from_user+0x34/0x3e0 [ 979.880797] getname_flags.part.0+0x95/0x4f0 [ 979.881465] getname+0x8e/0xd0 [ 979.881971] do_sys_openat2+0xf9/0x4c0 [ 979.882508] ? bit_wait_io_timeout+0x170/0x170 [ 979.883185] ? build_open_flags+0x6f0/0x6f0 [ 979.883774] ? perf_trace_run_bpf_submit+0xf5/0x1d0 [ 979.884503] __x64_sys_creat+0xc9/0x120 [ 979.885101] ? __ia32_sys_openat2+0xf0/0xf0 [ 979.885677] ? lock_is_held_type+0xd7/0x130 [ 979.886322] ? rcu_read_lock_sched_held+0x3e/0x80 [ 979.887028] ? syscall_trace_enter.constprop.0+0x111/0x220 [ 979.887368] ieee802154 phy0 wpan0: encryption failed: -22 [ 979.887783] do_syscall_64+0x3b/0x90 [ 979.889096] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 979.889798] RIP: 0033:0x7f53ed894b19 [ 979.890343] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 979.892703] RSP: 002b:00007f53eae0a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 979.893732] RAX: ffffffffffffffda RBX: 00007f53ed9a7f60 RCX: 00007f53ed894b19 [ 979.894710] RDX: 0000000000000000 RSI: 000000000000000e RDI: 0000000000000000 [ 979.895676] RBP: 00007f53eae0a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 979.896633] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 979.897582] R13: 00007ffe21e0ab2f R14: 00007f53eae0a300 R15: 0000000000022000 [ 979.898605] [ 979.900024] FAULT_INJECTION: forcing a failure. [ 979.900024] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 979.901741] CPU: 1 PID: 6845 Comm: syz-executor.5 Tainted: G W 6.0.0-rc1-next-20220818 #1 20:16:12 executing program 7: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2402, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0xfffffffffffffff8, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0xe) [ 979.910775] loop6: detected capacity change from 0 to 27 [ 979.917833] syz-executor.5[6845] cmdline: /syz-executor.5 exec [ 979.918822] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 979.920680] Call Trace: [ 979.921178] [ 979.921504] dump_stack_lvl+0x8b/0xb3 [ 979.922192] should_fail.cold+0x5/0xa [ 979.922740] _copy_from_user+0x2a/0x170 [ 979.923424] iovec_from_user+0x23a/0x3c0 [ 979.924131] ? __might_fault+0xd1/0x170 [ 979.924689] __import_iovec+0x64/0x600 [ 979.925377] import_iovec+0x83/0xb0 [ 979.926046] copy_msghdr_from_user+0xed/0x150 [ 979.926689] ? __copy_msghdr+0x4b0/0x4b0 [ 979.927411] ___sys_sendmsg+0xdd/0x1b0 [ 979.928096] ? __ia32_sys_recvmmsg+0x260/0x260 [ 979.928737] ? lock_release+0x3b2/0x750 [ 979.929446] ? __fget_files+0x24e/0x450 [ 979.930167] ? lock_downgrade+0x6d0/0x6d0 [ 979.930771] ? lock_is_held_type+0xd7/0x130 [ 979.931522] ? __fget_files+0x270/0x450 [ 979.932218] ? __fget_light+0xe5/0x280 [ 979.932806] __sys_sendmmsg+0x18b/0x460 [ 979.933502] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 979.934270] ? bit_wait_io_timeout+0x170/0x170 [ 979.935079] ? syscall_enter_from_user_mode+0x18/0x50 [ 979.935794] ? perf_trace_preemptirq_template+0xa2/0x420 [ 979.936692] ? __traceiter_irq_enable+0xa0/0xa0 [ 979.937493] ? lock_is_held_type+0xd7/0x130 [ 979.938243] __x64_sys_sendmmsg+0x99/0x100 [ 979.938975] do_syscall_64+0x3b/0x90 [ 979.939525] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 979.940380] RIP: 0033:0x7f228147eb19 [ 979.941030] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 979.943639] RSP: 002b:00007f227e9f4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 979.944810] RAX: ffffffffffffffda RBX: 00007f2281591f60 RCX: 00007f228147eb19 [ 979.945975] RDX: 0000000000000001 RSI: 0000000020000500 RDI: 0000000000000006 [ 979.947083] RBP: 00007f227e9f41d0 R08: 0000000000000000 R09: 0000000000000000 [ 979.948182] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 979.949291] R13: 00007ffff1e0ff6f R14: 00007f227e9f4300 R15: 0000000000022000 [ 979.950452] 20:16:12 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d9", 0xa}, {&(0x7f0000000100)="9f", 0x1}], 0x2, 0x0, 0x0, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 20:16:12 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x16db, &(0x7f0000000000)={0x0, 0x38e7, 0x2, 0x0, 0x19f}) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x3f, 0x9a, 0x1f, 0xf, 0x0, 0x160d, 0xc0b6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x1, @perf_bp={&(0x7f0000000340)}, 0x100, 0x70000, 0x6, 0x0, 0x7, 0xc697, 0x7, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3, 0x4, 0x61, 0x0, 0x0, 0x4, 0x204, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8e3c, 0xdc}, 0x8000, 0x40, 0x400, 0x1, 0x80000000, 0x400, 0x6, 0x0, 0x1, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r0, 0xa) fsetxattr(r2, &(0x7f0000000240)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='\'%\x1c\\%\x00', 0x6, 0x2) sendfile(r1, r0, 0x0, 0xfffffdef) [ 979.963290] loop3: detected capacity change from 0 to 40 [ 979.976346] FAT-fs (loop3): bogus number of reserved sectors [ 979.977178] FAT-fs (loop3): Can't find a valid FAT filesystem [ 979.986208] FAT-fs (loop6): Unrecognized mount option "flcontext=sysaäm_u" or missing value [ 980.029485] loop2: detected capacity change from 0 to 40 [ 980.045962] FAT-fs (loop2): bogus number of reserved sectors [ 980.046726] FAT-fs (loop2): Can't find a valid FAT filesystem VM DIAGNOSIS: 20:16:12 Registers: info registers vcpu 0 RAX=0000000000000020 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff8240ad71 RDI=ffffffff8762c6c0 RBP=ffffffff8762c680 RSP=ffff888046126fd8 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000020 R11=0000000000000001 R12=0000000000000020 R13=ffffffff8762c680 R14=0000000000000010 R15=ffffffff8240ad60 RIP=ffffffff8240adc9 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fec3ffaf700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fec3ffaef78 CR3=000000001b72e000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff4ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM03=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffffffffff00 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=ffff888008655100 RBX=0000000000000007 RCX=1ffff11001fc83ea RDX=1ffff1100d9e70d4 RSI=0000000000000002 RDI=0000000000000000 RBP=ffff888008ddfec8 RSP=ffff888008ddfdf8 R8 =ffff88806cf386c8 R9 =ffffffff85aee357 R10=ffff88800fe41f50 R11=0000000000000001 R12=ffff88806cf37cc0 R13=ffff88800fe41b00 R14=ffff888010288450 R15=ffff888010288000 RIP=ffffffff841ee353 RFL=00000087 [--S--PC] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0000 0000000000000000 00000000 00000000 DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fe24521a900 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fe24461f7e0 CR3=000000000f4fa000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff4ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 494e4f544f4e4f4d 5f454352554f535f YMM01=0000000000000000 0000000000000000 4d49545f43494e4f 544f4e4f4d5f4543 YMM02=0000000000000000 0000000000000000 3830306234386136 3036386166633561 YMM03=0000000000000000 0000000000000000 2f6c616e72756f6a 2f676f6c2f6e7572 YMM04=0000000000000000 0000000000000000 6d0b25b7c4d9b431 00000000001d8e88 YMM05=0000000000000000 0000000000000000 d3fdd5f48436fbd7 00000000000aead0 YMM06=0000000000000000 0000000000000000 7c288c80205b585f 00000000000ae988 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 44495f474f4c5359 530069253d595449 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000002020000000 0000002000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000