Debian GNU/Linux 11 syzkaller ttyS0 Warning: Permanently added '[localhost]:57777' (ECDSA) to the list of known hosts. 2022/10/05 12:05:35 fuzzer started 2022/10/05 12:05:36 dialing manager at localhost:37193 syzkaller login: [ 44.403899] cgroup: Unknown subsys name 'net' [ 44.501326] cgroup: Unknown subsys name 'rlimit' 2022/10/05 12:05:49 syscalls: 2215 2022/10/05 12:05:49 code coverage: enabled 2022/10/05 12:05:49 comparison tracing: enabled 2022/10/05 12:05:49 extra coverage: enabled 2022/10/05 12:05:49 setuid sandbox: enabled 2022/10/05 12:05:49 namespace sandbox: enabled 2022/10/05 12:05:49 Android sandbox: enabled 2022/10/05 12:05:49 fault injection: enabled 2022/10/05 12:05:49 leak checking: enabled 2022/10/05 12:05:49 net packet injection: enabled 2022/10/05 12:05:49 net device setup: enabled 2022/10/05 12:05:49 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/10/05 12:05:49 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/10/05 12:05:49 USB emulation: enabled 2022/10/05 12:05:49 hci packet injection: enabled 2022/10/05 12:05:49 wifi device emulation: failed to parse kernel version (6.0.0-next-20221005) 2022/10/05 12:05:49 802.15.4 emulation: enabled 2022/10/05 12:05:49 fetching corpus: 0, signal 0/2000 (executing program) 2022/10/05 12:05:49 fetching corpus: 50, signal 30483/33814 (executing program) 2022/10/05 12:05:49 fetching corpus: 100, signal 41431/46046 (executing program) 2022/10/05 12:05:49 fetching corpus: 150, signal 49524/55365 (executing program) 2022/10/05 12:05:49 fetching corpus: 200, signal 52266/59391 (executing program) 2022/10/05 12:05:49 fetching corpus: 250, signal 57280/65493 (executing program) 2022/10/05 12:05:49 fetching corpus: 300, signal 60948/70234 (executing program) 2022/10/05 12:05:49 fetching corpus: 350, signal 64921/75189 (executing program) 2022/10/05 12:05:49 fetching corpus: 400, signal 68863/80007 (executing program) 2022/10/05 12:05:50 fetching corpus: 450, signal 71023/83145 (executing program) 2022/10/05 12:05:50 fetching corpus: 500, signal 74008/87013 (executing program) 2022/10/05 12:05:50 fetching corpus: 550, signal 77761/91490 (executing program) 2022/10/05 12:05:50 fetching corpus: 600, signal 80992/95362 (executing program) 2022/10/05 12:05:50 fetching corpus: 650, signal 83634/98669 (executing program) 2022/10/05 12:05:50 fetching corpus: 700, signal 86591/102239 (executing program) 2022/10/05 12:05:50 fetching corpus: 750, signal 89225/105468 (executing program) 2022/10/05 12:05:50 fetching corpus: 800, signal 92335/108973 (executing program) 2022/10/05 12:05:50 fetching corpus: 850, signal 94819/111936 (executing program) 2022/10/05 12:05:50 fetching corpus: 900, signal 97478/115027 (executing program) 2022/10/05 12:05:51 fetching corpus: 950, signal 100156/118048 (executing program) 2022/10/05 12:05:51 fetching corpus: 1000, signal 103550/121516 (executing program) 2022/10/05 12:05:51 fetching corpus: 1050, signal 106708/124884 (executing program) 2022/10/05 12:05:51 fetching corpus: 1100, signal 108673/127208 (executing program) 2022/10/05 12:05:51 fetching corpus: 1150, signal 110197/129193 (executing program) 2022/10/05 12:05:51 fetching corpus: 1200, signal 111528/130959 (executing program) 2022/10/05 12:05:51 fetching corpus: 1250, signal 113515/133165 (executing program) 2022/10/05 12:05:51 fetching corpus: 1300, signal 115107/135064 (executing program) 2022/10/05 12:05:52 fetching corpus: 1350, signal 118627/138214 (executing program) 2022/10/05 12:05:52 fetching corpus: 1400, signal 120104/139922 (executing program) 2022/10/05 12:05:52 fetching corpus: 1450, signal 121152/141356 (executing program) 2022/10/05 12:05:52 fetching corpus: 1500, signal 124214/143998 (executing program) 2022/10/05 12:05:52 fetching corpus: 1550, signal 125296/145385 (executing program) 2022/10/05 12:05:52 fetching corpus: 1600, signal 126908/147018 (executing program) 2022/10/05 12:05:52 fetching corpus: 1650, signal 128468/148656 (executing program) 2022/10/05 12:05:52 fetching corpus: 1700, signal 130421/150413 (executing program) 2022/10/05 12:05:53 fetching corpus: 1750, signal 131488/151612 (executing program) 2022/10/05 12:05:53 fetching corpus: 1800, signal 132373/152698 (executing program) 2022/10/05 12:05:53 fetching corpus: 1850, signal 133625/154003 (executing program) 2022/10/05 12:05:53 fetching corpus: 1900, signal 134376/154984 (executing program) 2022/10/05 12:05:53 fetching corpus: 1950, signal 135105/155940 (executing program) 2022/10/05 12:05:53 fetching corpus: 2000, signal 135850/156905 (executing program) 2022/10/05 12:05:53 fetching corpus: 2050, signal 136480/157730 (executing program) 2022/10/05 12:05:53 fetching corpus: 2100, signal 137573/158793 (executing program) 2022/10/05 12:05:53 fetching corpus: 2150, signal 138209/159608 (executing program) 2022/10/05 12:05:53 fetching corpus: 2200, signal 138867/160424 (executing program) 2022/10/05 12:05:53 fetching corpus: 2250, signal 139913/161427 (executing program) 2022/10/05 12:05:54 fetching corpus: 2300, signal 141461/162640 (executing program) 2022/10/05 12:05:54 fetching corpus: 2350, signal 142813/163706 (executing program) 2022/10/05 12:05:54 fetching corpus: 2400, signal 143911/164645 (executing program) 2022/10/05 12:05:54 fetching corpus: 2450, signal 145680/165870 (executing program) 2022/10/05 12:05:54 fetching corpus: 2500, signal 148087/167365 (executing program) 2022/10/05 12:05:54 fetching corpus: 2550, signal 148797/168050 (executing program) 2022/10/05 12:05:54 fetching corpus: 2600, signal 149639/168732 (executing program) 2022/10/05 12:05:54 fetching corpus: 2650, signal 151520/169887 (executing program) 2022/10/05 12:05:54 fetching corpus: 2700, signal 152049/170441 (executing program) 2022/10/05 12:05:55 fetching corpus: 2750, signal 152981/171118 (executing program) 2022/10/05 12:05:55 fetching corpus: 2800, signal 153656/171705 (executing program) 2022/10/05 12:05:55 fetching corpus: 2850, signal 154265/172268 (executing program) 2022/10/05 12:05:55 fetching corpus: 2900, signal 155145/172882 (executing program) 2022/10/05 12:05:55 fetching corpus: 2950, signal 156910/173745 (executing program) 2022/10/05 12:05:55 fetching corpus: 3000, signal 157310/174138 (executing program) 2022/10/05 12:05:55 fetching corpus: 3050, signal 158574/174797 (executing program) 2022/10/05 12:05:55 fetching corpus: 3100, signal 159357/175298 (executing program) 2022/10/05 12:05:55 fetching corpus: 3150, signal 160118/175854 (executing program) 2022/10/05 12:05:55 fetching corpus: 3200, signal 161519/176462 (executing program) 2022/10/05 12:05:56 fetching corpus: 3250, signal 162183/176845 (executing program) 2022/10/05 12:05:56 fetching corpus: 3300, signal 163109/177313 (executing program) 2022/10/05 12:05:56 fetching corpus: 3350, signal 164519/177844 (executing program) 2022/10/05 12:05:56 fetching corpus: 3400, signal 165313/178235 (executing program) 2022/10/05 12:05:56 fetching corpus: 3450, signal 166038/178581 (executing program) 2022/10/05 12:05:56 fetching corpus: 3500, signal 166945/178983 (executing program) 2022/10/05 12:05:56 fetching corpus: 3550, signal 167656/179280 (executing program) 2022/10/05 12:05:56 fetching corpus: 3600, signal 168112/179531 (executing program) 2022/10/05 12:05:56 fetching corpus: 3650, signal 168688/179772 (executing program) 2022/10/05 12:05:56 fetching corpus: 3700, signal 169561/180084 (executing program) 2022/10/05 12:05:56 fetching corpus: 3750, signal 170472/180362 (executing program) 2022/10/05 12:05:57 fetching corpus: 3800, signal 171132/180606 (executing program) 2022/10/05 12:05:57 fetching corpus: 3850, signal 172415/180895 (executing program) 2022/10/05 12:05:57 fetching corpus: 3900, signal 173190/181096 (executing program) 2022/10/05 12:05:57 fetching corpus: 3950, signal 173874/181260 (executing program) 2022/10/05 12:05:57 fetching corpus: 4000, signal 174826/181452 (executing program) 2022/10/05 12:05:57 fetching corpus: 4050, signal 175602/181614 (executing program) 2022/10/05 12:05:57 fetching corpus: 4100, signal 176192/181761 (executing program) 2022/10/05 12:05:57 fetching corpus: 4150, signal 176689/181857 (executing program) 2022/10/05 12:05:57 fetching corpus: 4200, signal 177157/181950 (executing program) 2022/10/05 12:05:57 fetching corpus: 4250, signal 177790/182102 (executing program) 2022/10/05 12:05:58 fetching corpus: 4287, signal 178178/182165 (executing program) 2022/10/05 12:05:58 fetching corpus: 4287, signal 178178/182209 (executing program) 2022/10/05 12:05:58 fetching corpus: 4287, signal 178178/182259 (executing program) 2022/10/05 12:05:58 fetching corpus: 4287, signal 178178/182314 (executing program) 2022/10/05 12:05:58 fetching corpus: 4287, signal 178178/182328 (executing program) 2022/10/05 12:05:58 fetching corpus: 4287, signal 178178/182328 (executing program) 2022/10/05 12:06:00 starting 8 fuzzer processes 12:06:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 12:06:01 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) 12:06:01 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) 12:06:01 executing program 3: mlock2(&(0x7f0000ff5000/0x1000)=nil, 0x1000, 0x0) r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0xcf3caed3d8c7cb92) mlock2(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) [ 69.255404] audit: type=1400 audit(1664971561.056:6): avc: denied { execmem } for pid=293 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 12:06:01 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001680)='/proc/stat\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) 12:06:01 executing program 5: pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000800), 0x340, 0x0) 12:06:01 executing program 6: remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0xfffffffffffffffe, 0x0) 12:06:01 executing program 7: r0 = syz_open_dev$rtc(&(0x7f0000000000), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xa, 0x0, 0x1422}) pipe2$9p(0x0, 0x0) [ 70.524179] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 70.526612] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 70.529430] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 70.537195] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 70.539607] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 70.540514] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 70.546577] Bluetooth: hci0: HCI_REQ-0x0c1a [ 70.594754] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 70.596158] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 70.600366] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 70.601921] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 70.603666] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 70.605052] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 70.606188] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 70.607196] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 70.608476] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 70.609807] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 70.610705] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 70.615154] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 70.616283] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 70.617349] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 70.620499] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 70.622015] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 70.623057] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 70.624589] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 70.626035] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 70.644478] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 70.646372] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 70.647557] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 70.649933] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 70.651023] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 70.652083] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 70.658192] Bluetooth: hci1: HCI_REQ-0x0c1a [ 70.659251] Bluetooth: hci2: HCI_REQ-0x0c1a [ 70.660641] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 70.663508] Bluetooth: hci3: HCI_REQ-0x0c1a [ 70.664768] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 70.670358] Bluetooth: hci4: HCI_REQ-0x0c1a [ 70.712079] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 70.716091] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 70.717323] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 70.718894] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 70.719114] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 70.721993] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 70.722010] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 70.723521] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 70.728064] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 70.729252] Bluetooth: hci6: HCI_REQ-0x0c1a [ 70.731957] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 70.746345] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 70.747694] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 70.750682] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 70.753421] Bluetooth: hci7: HCI_REQ-0x0c1a [ 70.762344] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 70.763775] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 70.811937] Bluetooth: hci5: HCI_REQ-0x0c1a [ 72.611474] Bluetooth: hci0: command 0x0409 tx timeout [ 72.675045] Bluetooth: hci4: command 0x0409 tx timeout [ 72.675074] Bluetooth: hci3: command 0x0409 tx timeout [ 72.676344] Bluetooth: hci2: command 0x0409 tx timeout [ 72.738997] Bluetooth: hci6: command 0x0409 tx timeout [ 72.739021] Bluetooth: hci1: command 0x0409 tx timeout [ 72.803109] Bluetooth: hci7: command 0x0409 tx timeout [ 72.866875] Bluetooth: hci5: command 0x0409 tx timeout [ 74.658883] Bluetooth: hci0: command 0x041b tx timeout [ 74.722866] Bluetooth: hci3: command 0x041b tx timeout [ 74.723301] Bluetooth: hci4: command 0x041b tx timeout [ 74.724060] Bluetooth: hci2: command 0x041b tx timeout [ 74.786827] Bluetooth: hci1: command 0x041b tx timeout [ 74.787966] Bluetooth: hci6: command 0x041b tx timeout [ 74.850859] Bluetooth: hci7: command 0x041b tx timeout [ 74.914928] Bluetooth: hci5: command 0x041b tx timeout [ 76.706829] Bluetooth: hci0: command 0x040f tx timeout [ 76.770856] Bluetooth: hci2: command 0x040f tx timeout [ 76.771300] Bluetooth: hci4: command 0x040f tx timeout [ 76.771660] Bluetooth: hci3: command 0x040f tx timeout [ 76.834852] Bluetooth: hci6: command 0x040f tx timeout [ 76.835297] Bluetooth: hci1: command 0x040f tx timeout [ 76.898866] Bluetooth: hci7: command 0x040f tx timeout [ 76.962858] Bluetooth: hci5: command 0x040f tx timeout [ 78.754832] Bluetooth: hci0: command 0x0419 tx timeout [ 78.818868] Bluetooth: hci3: command 0x0419 tx timeout [ 78.819316] Bluetooth: hci4: command 0x0419 tx timeout [ 78.819671] Bluetooth: hci2: command 0x0419 tx timeout [ 78.882901] Bluetooth: hci1: command 0x0419 tx timeout [ 78.883343] Bluetooth: hci6: command 0x0419 tx timeout [ 78.946874] Bluetooth: hci7: command 0x0419 tx timeout [ 79.010889] Bluetooth: hci5: command 0x0419 tx timeout [ 123.770239] audit: type=1400 audit(1664971615.571:7): avc: denied { open } for pid=3707 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 123.771843] audit: type=1400 audit(1664971615.571:8): avc: denied { kernel } for pid=3707 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 123.785798] ------------[ cut here ]------------ [ 123.785817] [ 123.785820] ====================================================== [ 123.785823] WARNING: possible circular locking dependency detected [ 123.785828] 6.0.0-next-20221005 #1 Not tainted [ 123.785834] ------------------------------------------------------ [ 123.785837] syz-executor.1/3709 is trying to acquire lock: [ 123.785844] ffffffff853faaf8 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 123.785887] [ 123.785887] but task is already holding lock: [ 123.785890] ffff88800efb6020 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 123.785917] [ 123.785917] which lock already depends on the new lock. [ 123.785917] [ 123.785920] [ 123.785920] the existing dependency chain (in reverse order) is: [ 123.785923] [ 123.785923] -> #3 (&ctx->lock){....}-{2:2}: [ 123.785937] _raw_spin_lock+0x2a/0x40 [ 123.785950] __perf_event_task_sched_out+0x53b/0x18d0 [ 123.785961] __schedule+0xedd/0x2470 [ 123.785976] schedule+0xda/0x1b0 [ 123.785990] exit_to_user_mode_prepare+0x114/0x1a0 [ 123.786002] syscall_exit_to_user_mode+0x19/0x40 [ 123.786016] do_syscall_64+0x48/0x90 [ 123.786026] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 123.786039] [ 123.786039] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 123.786053] _raw_spin_lock_nested+0x30/0x40 [ 123.786064] raw_spin_rq_lock_nested+0x1e/0x30 [ 123.786078] task_fork_fair+0x63/0x4d0 [ 123.786095] sched_cgroup_fork+0x3d0/0x540 [ 123.786109] copy_process+0x4183/0x6e20 [ 123.786121] kernel_clone+0xe7/0x890 [ 123.786130] user_mode_thread+0xad/0xf0 [ 123.786140] rest_init+0x24/0x250 [ 123.786153] arch_call_rest_init+0xf/0x14 [ 123.786172] start_kernel+0x4c6/0x4eb [ 123.786189] secondary_startup_64_no_verify+0xe0/0xeb [ 123.786203] [ 123.786203] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 123.786217] _raw_spin_lock_irqsave+0x39/0x60 [ 123.786228] try_to_wake_up+0xab/0x1930 [ 123.786241] up+0x75/0xb0 [ 123.786256] __up_console_sem+0x6e/0x80 [ 123.786272] console_unlock+0x46a/0x590 [ 123.786288] vprintk_emit+0x1bd/0x560 [ 123.786304] vprintk+0x84/0xa0 [ 123.786320] _printk+0xba/0xf1 [ 123.786332] regdb_fw_cb.cold+0x6c/0xa7 [ 123.786350] request_firmware_work_func+0x12e/0x240 [ 123.786371] process_one_work+0xa17/0x16a0 [ 123.786388] worker_thread+0x637/0x1260 [ 123.786404] kthread+0x2ed/0x3a0 [ 123.786419] ret_from_fork+0x22/0x30 [ 123.786431] [ 123.786431] -> #0 ((console_sem).lock){....}-{2:2}: [ 123.786444] __lock_acquire+0x2a02/0x5e70 [ 123.786461] lock_acquire+0x1a2/0x530 [ 123.786477] _raw_spin_lock_irqsave+0x39/0x60 [ 123.786489] down_trylock+0xe/0x70 [ 123.786504] __down_trylock_console_sem+0x3b/0xd0 [ 123.786520] vprintk_emit+0x16b/0x560 [ 123.786536] vprintk+0x84/0xa0 [ 123.786552] _printk+0xba/0xf1 [ 123.786563] report_bug.cold+0x72/0xab [ 123.786579] handle_bug+0x3c/0x70 [ 123.786588] exc_invalid_op+0x14/0x50 [ 123.786598] asm_exc_invalid_op+0x16/0x20 [ 123.786611] group_sched_out.part.0+0x2c7/0x460 [ 123.786629] ctx_sched_out+0x8f1/0xc10 [ 123.786645] __perf_event_task_sched_out+0x6d0/0x18d0 [ 123.786656] __schedule+0xedd/0x2470 [ 123.786671] schedule+0xda/0x1b0 [ 123.786684] exit_to_user_mode_prepare+0x114/0x1a0 [ 123.786695] syscall_exit_to_user_mode+0x19/0x40 [ 123.786708] do_syscall_64+0x48/0x90 [ 123.786717] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 123.786731] [ 123.786731] other info that might help us debug this: [ 123.786731] [ 123.786733] Chain exists of: [ 123.786733] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 123.786733] [ 123.786748] Possible unsafe locking scenario: [ 123.786748] [ 123.786750] CPU0 CPU1 [ 123.786753] ---- ---- [ 123.786755] lock(&ctx->lock); [ 123.786760] lock(&rq->__lock); [ 123.786767] lock(&ctx->lock); [ 123.786773] lock((console_sem).lock); [ 123.786779] [ 123.786779] *** DEADLOCK *** [ 123.786779] [ 123.786781] 2 locks held by syz-executor.1/3709: [ 123.786788] #0: ffff88806cf37e98 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 123.786818] #1: ffff88800efb6020 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 123.786844] [ 123.786844] stack backtrace: [ 123.786847] CPU: 1 PID: 3709 Comm: syz-executor.1 Not tainted 6.0.0-next-20221005 #1 [ 123.786859] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 123.786866] Call Trace: [ 123.786870] [ 123.786873] dump_stack_lvl+0x8b/0xb3 [ 123.786892] check_noncircular+0x263/0x2e0 [ 123.786909] ? format_decode+0x26c/0xb50 [ 123.786927] ? print_circular_bug+0x450/0x450 [ 123.786944] ? simple_strtoul+0x30/0x30 [ 123.786961] ? format_decode+0x26c/0xb50 [ 123.786979] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 123.786997] __lock_acquire+0x2a02/0x5e70 [ 123.787019] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 123.787042] lock_acquire+0x1a2/0x530 [ 123.787059] ? down_trylock+0xe/0x70 [ 123.787077] ? lock_release+0x750/0x750 [ 123.787098] ? vprintk+0x84/0xa0 [ 123.787116] _raw_spin_lock_irqsave+0x39/0x60 [ 123.787128] ? down_trylock+0xe/0x70 [ 123.787145] down_trylock+0xe/0x70 [ 123.787162] ? vprintk+0x84/0xa0 [ 123.787179] __down_trylock_console_sem+0x3b/0xd0 [ 123.787197] vprintk_emit+0x16b/0x560 [ 123.787216] vprintk+0x84/0xa0 [ 123.787234] _printk+0xba/0xf1 [ 123.787246] ? record_print_text.cold+0x16/0x16 [ 123.787263] ? report_bug.cold+0x66/0xab [ 123.787282] ? group_sched_out.part.0+0x2c7/0x460 [ 123.787301] report_bug.cold+0x72/0xab [ 123.787320] handle_bug+0x3c/0x70 [ 123.787331] exc_invalid_op+0x14/0x50 [ 123.787341] asm_exc_invalid_op+0x16/0x20 [ 123.787355] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 123.787376] Code: 5e 41 5f e9 8b ae ef ff e8 86 ae ef ff 65 8b 1d 2b 08 ac 7e 31 ff 89 de e8 26 ab ef ff 85 db 0f 84 8a 00 00 00 e8 69 ae ef ff <0f> 0b e9 a5 fe ff ff e8 5d ae ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 123.787387] RSP: 0018:ffff888020a97c48 EFLAGS: 00010006 [ 123.787396] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 123.787404] RDX: ffff88801a268000 RSI: ffffffff81566da7 RDI: 0000000000000005 [ 123.787411] RBP: ffff88803e598000 R08: 0000000000000005 R09: 0000000000000001 [ 123.787419] R10: 0000000000000000 R11: ffffffff865b605b R12: ffff88800efb6000 [ 123.787427] R13: ffff88806cf3d2c0 R14: ffffffff8547d040 R15: 0000000000000002 [ 123.787438] ? group_sched_out.part.0+0x2c7/0x460 [ 123.787457] ? group_sched_out.part.0+0x2c7/0x460 [ 123.787477] ctx_sched_out+0x8f1/0xc10 [ 123.787496] __perf_event_task_sched_out+0x6d0/0x18d0 [ 123.787510] ? lock_is_held_type+0xd7/0x130 [ 123.787525] ? __perf_cgroup_move+0x160/0x160 [ 123.787535] ? set_next_entity+0x304/0x550 [ 123.787553] ? update_curr+0x267/0x740 [ 123.787578] ? lock_is_held_type+0xd7/0x130 [ 123.787592] __schedule+0xedd/0x2470 [ 123.787610] ? io_schedule_timeout+0x150/0x150 [ 123.787627] ? rcu_read_lock_sched_held+0x3e/0x80 [ 123.787648] schedule+0xda/0x1b0 [ 123.787664] exit_to_user_mode_prepare+0x114/0x1a0 [ 123.787676] syscall_exit_to_user_mode+0x19/0x40 [ 123.787690] do_syscall_64+0x48/0x90 [ 123.787701] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 123.787714] RIP: 0033:0x7ff0f45a7b19 [ 123.787723] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 123.787734] RSP: 002b:00007ff0f1b1d218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 123.787744] RAX: 0000000000000001 RBX: 00007ff0f46baf68 RCX: 00007ff0f45a7b19 [ 123.787752] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007ff0f46baf6c [ 123.787759] RBP: 00007ff0f46baf60 R08: 000000000000000e R09: 0000000000000000 [ 123.787767] R10: 0000000000000003 R11: 0000000000000246 R12: 00007ff0f46baf6c [ 123.787774] R13: 00007ffe9fae924f R14: 00007ff0f1b1d300 R15: 0000000000022000 [ 123.787786] [ 123.841179] WARNING: CPU: 1 PID: 3709 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 123.841824] Modules linked in: [ 123.842057] CPU: 1 PID: 3709 Comm: syz-executor.1 Not tainted 6.0.0-next-20221005 #1 [ 123.842596] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 123.843175] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 123.843571] Code: 5e 41 5f e9 8b ae ef ff e8 86 ae ef ff 65 8b 1d 2b 08 ac 7e 31 ff 89 de e8 26 ab ef ff 85 db 0f 84 8a 00 00 00 e8 69 ae ef ff <0f> 0b e9 a5 fe ff ff e8 5d ae ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 123.844834] RSP: 0018:ffff888020a97c48 EFLAGS: 00010006 [ 123.845208] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 123.845705] RDX: ffff88801a268000 RSI: ffffffff81566da7 RDI: 0000000000000005 [ 123.846197] RBP: ffff88803e598000 R08: 0000000000000005 R09: 0000000000000001 [ 123.846697] R10: 0000000000000000 R11: ffffffff865b605b R12: ffff88800efb6000 [ 123.847207] R13: ffff88806cf3d2c0 R14: ffffffff8547d040 R15: 0000000000000002 [ 123.847727] FS: 00007ff0f1b1d700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 [ 123.848291] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 123.848697] CR2: 00007fc4981f46f4 CR3: 000000000f092000 CR4: 0000000000350ee0 [ 123.849192] Call Trace: [ 123.849380] [ 123.849544] ctx_sched_out+0x8f1/0xc10 [ 123.849836] __perf_event_task_sched_out+0x6d0/0x18d0 [ 123.850205] ? lock_is_held_type+0xd7/0x130 [ 123.850518] ? __perf_cgroup_move+0x160/0x160 [ 123.850830] ? set_next_entity+0x304/0x550 [ 123.851138] ? update_curr+0x267/0x740 [ 123.851424] ? lock_is_held_type+0xd7/0x130 [ 123.851744] __schedule+0xedd/0x2470 [ 123.852018] ? io_schedule_timeout+0x150/0x150 [ 123.852355] ? rcu_read_lock_sched_held+0x3e/0x80 [ 123.852702] schedule+0xda/0x1b0 [ 123.852962] exit_to_user_mode_prepare+0x114/0x1a0 [ 123.853315] syscall_exit_to_user_mode+0x19/0x40 [ 123.853659] do_syscall_64+0x48/0x90 [ 123.853931] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 123.854305] RIP: 0033:0x7ff0f45a7b19 [ 123.854574] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 123.855844] RSP: 002b:00007ff0f1b1d218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 123.856377] RAX: 0000000000000001 RBX: 00007ff0f46baf68 RCX: 00007ff0f45a7b19 [ 123.856878] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007ff0f46baf6c [ 123.857384] RBP: 00007ff0f46baf60 R08: 000000000000000e R09: 0000000000000000 [ 123.857883] R10: 0000000000000003 R11: 0000000000000246 R12: 00007ff0f46baf6c [ 123.858379] R13: 00007ffe9fae924f R14: 00007ff0f1b1d300 R15: 0000000000022000 [ 123.858887] [ 123.859055] irq event stamp: 638 [ 123.859295] hardirqs last enabled at (637): [] exit_to_user_mode_prepare+0x109/0x1a0 [ 123.859952] hardirqs last disabled at (638): [] __schedule+0x1225/0x2470 [ 123.860536] softirqs last enabled at (304): [] __irq_exit_rcu+0x11b/0x180 [ 123.861133] softirqs last disabled at (289): [] __irq_exit_rcu+0x11b/0x180 [ 123.861728] ---[ end trace 0000000000000000 ]--- 12:06:55 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) 12:06:56 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) 12:06:56 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) 12:06:56 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) 12:06:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000007f00)={0x18, 0x15, 0x1, 0x0, 0x0, "", [@generic="026b02db13"]}, 0x18}], 0x1}, 0x0) 12:06:56 executing program 1: syz_open_procfs(0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000003c0)=ANY=[@ANYBLOB="1c0000001e0069ff000000000000020007"], 0x1c}], 0x1}, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800a03, 0x0) read(r0, &(0x7f00000001c0)=""/133, 0x85) 12:06:56 executing program 1: syz_open_procfs(0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000003c0)=ANY=[@ANYBLOB="1c0000001e0069ff000000000000020007"], 0x1c}], 0x1}, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800a03, 0x0) read(r0, &(0x7f00000001c0)=""/133, 0x85) 12:06:56 executing program 3: request_key(&(0x7f0000002500)='asymmetric\x00', &(0x7f0000002540)={'syz', 0x1}, 0x0, 0x0) [ 124.901654] mmap: syz-executor.6 (3820) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 126.335054] audit: type=1400 audit(1664971618.136:9): avc: denied { write } for pid=3939 comm="syz-executor.5" name="task" dev="proc" ino=14620 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=1 [ 126.336955] audit: type=1400 audit(1664971618.136:10): avc: denied { add_name } for pid=3939 comm="syz-executor.5" name="3940" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=1 [ 126.338923] audit: type=1400 audit(1664971618.136:11): avc: denied { create } for pid=3939 comm="syz-executor.5" name="3940" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:kernel_t:s0 tclass=file permissive=1 [ 126.520342] loop2: detected capacity change from 0 to 264192 [ 126.526640] FAT-fs (loop2): Unrecognized mount option "000000000000031203752461844674407370955161500000000000000000000004" or missing value [ 126.550279] loop2: detected capacity change from 0 to 264192 [ 126.550993] FAT-fs (loop2): Unrecognized mount option "000000000000015127113231844674407370955161500000000000000000000004" or missing value 12:06:59 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) 12:06:59 executing program 5: syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x56a, 0x302, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x0, 0x40, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x81, {0x9, 0x21, 0xfff8, 0xff, 0x1, {0x22, 0x4c6}}, {{}, [{{0x9, 0x5, 0x2, 0x3, 0x0, 0x8}}]}}}]}}]}}, 0x0) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000200)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd8c, 0x22, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x4, 0x2, 0x3, 0x1, 0x2, 0x6, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0xd6c}}, {{{0x9, 0x5, 0x81, 0x3, 0x0, 0x0, 0x2d}}}}}]}}]}}, 0x0) 12:06:59 executing program 7: r0 = syz_open_dev$rtc(&(0x7f0000000000), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xa, 0x0, 0x1422}) pipe2$9p(0x0, 0x0) 12:06:59 executing program 3: r0 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x6}) fallocate(r0, 0x0, 0x0, 0x7) ftruncate(r0, 0x3e7e) read(r0, 0x0, 0x0) 12:06:59 executing program 1: syz_open_procfs(0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000003c0)=ANY=[@ANYBLOB="1c0000001e0069ff000000000000020007"], 0x1c}], 0x1}, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800a03, 0x0) read(r0, &(0x7f00000001c0)=""/133, 0x85) 12:06:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 12:06:59 executing program 6: remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0xfffffffffffffffe, 0x0) 12:06:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_sset_info={0x26, 0x8000000}}) [ 127.483075] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 127.484612] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 127.488735] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 127.503986] misc raw-gadget: fail, usb_gadget_register_driver returned -16 12:06:59 executing program 6: remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0xfffffffffffffffe, 0x0) 12:06:59 executing program 3: r0 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x6}) fallocate(r0, 0x0, 0x0, 0x7) ftruncate(r0, 0x3e7e) read(r0, 0x0, 0x0) 12:06:59 executing program 1: syz_open_procfs(0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000003c0)=ANY=[@ANYBLOB="1c0000001e0069ff000000000000020007"], 0x1c}], 0x1}, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800a03, 0x0) read(r0, &(0x7f00000001c0)=""/133, 0x85) 12:06:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_sset_info={0x26, 0x8000000}}) 12:06:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 12:06:59 executing program 7: r0 = syz_open_dev$rtc(&(0x7f0000000000), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xa, 0x0, 0x1422}) pipe2$9p(0x0, 0x0) 12:06:59 executing program 6: remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0xfffffffffffffffe, 0x0) 12:06:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_sset_info={0x26, 0x8000000}}) [ 127.758796] hrtimer: interrupt took 17723 ns [ 128.026350] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 128.029052] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 128.328432] loop2: detected capacity change from 0 to 264192 12:07:00 executing program 7: r0 = syz_open_dev$rtc(&(0x7f0000000000), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xa, 0x0, 0x1422}) pipe2$9p(0x0, 0x0) 12:07:00 executing program 3: r0 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x6}) fallocate(r0, 0x0, 0x0, 0x7) ftruncate(r0, 0x3e7e) read(r0, 0x0, 0x0) 12:07:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 12:07:00 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 12:07:00 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_sset_info={0x26, 0x8000000}}) 12:07:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 12:07:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 12:07:00 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) 12:07:00 executing program 3: r0 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x6}) fallocate(r0, 0x0, 0x0, 0x7) ftruncate(r0, 0x3e7e) read(r0, 0x0, 0x0) 12:07:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) [ 128.613973] loop2: detected capacity change from 0 to 264192 [ 128.624971] FAT-fs (loop2): Unrecognized mount option "000000000000043124544231844674407370955161501777777777777777777777" or missing value 12:07:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 12:07:00 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) 12:07:00 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 12:07:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 12:07:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 12:07:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 12:07:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 12:07:00 executing program 7: r0 = syz_open_dev$rtc(&(0x7f0000000000), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xa, 0x0, 0x1422}) pipe2$9p(0x0, 0x0) [ 129.023263] loop2: detected capacity change from 0 to 264192 12:07:00 executing program 7: r0 = syz_open_dev$rtc(&(0x7f0000000000), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xa, 0x0, 0x1422}) pipe2$9p(0x0, 0x0) 12:07:00 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 12:07:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) [ 129.082742] FAT-fs (loop2): Unrecognized mount option "000000000000055265322771844674407370955161500000000000000000000004" or missing value 12:07:00 executing program 7: r0 = syz_open_dev$rtc(&(0x7f0000000000), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xa, 0x0, 0x1422}) pipe2$9p(0x0, 0x0) 12:07:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 12:07:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 12:07:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 12:07:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 12:07:01 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) 12:07:01 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) 12:07:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 12:07:01 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) 12:07:01 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) 12:07:01 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) [ 129.448490] loop6: detected capacity change from 0 to 264192 [ 129.459161] FAT-fs (loop6): Unrecognized mount option "000000000000041257000501844674407370955161500000000000000000000004" or missing value 12:07:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 12:07:01 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) [ 129.606259] loop1: detected capacity change from 0 to 264192 [ 129.611479] FAT-fs (loop1): Unrecognized mount option "017777777777777777777771844674407370955161500000000000000000000004" or missing value [ 129.645904] loop7: detected capacity change from 0 to 264192 [ 129.648538] FAT-fs (loop7): Unrecognized mount option "017777777777777777777771844674407370955161500000000000000000000004" or missing value [ 129.689912] loop5: detected capacity change from 0 to 264192 [ 129.694157] FAT-fs (loop5): Unrecognized mount option "017777777777777777777771844674407370955161500000000000000000000004" or missing value [ 129.697932] loop2: detected capacity change from 0 to 264192 [ 129.700556] FAT-fs (loop2): Unrecognized mount option "017777777777777777777771844674407370955161500000000000000000000004" or missing value [ 129.930549] loop6: detected capacity change from 0 to 264192 [ 129.953890] FAT-fs (loop6): Unrecognized mount option "000000000000015325410061844674407370955161500000000000000000000004" or missing value 12:07:01 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) 12:07:01 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) 12:07:01 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) 12:07:01 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) 12:07:01 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) 12:07:01 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) 12:07:01 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) write$binfmt_aout(r0, &(0x7f00000000c0)={{}, "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"}, 0xd00) 12:07:01 executing program 3: rt_sigaction(0x0, &(0x7f0000001b40)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000001b80)) 12:07:01 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="001100000000000000010007"], 0x90) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, 0x0, 0x0) [ 130.240753] loop7: detected capacity change from 0 to 264192 12:07:02 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) write$binfmt_aout(r0, &(0x7f00000000c0)={{}, "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"}, 0xd00) [ 130.259435] loop2: detected capacity change from 0 to 264192 [ 130.268535] loop6: detected capacity change from 0 to 264192 [ 130.270088] FAT-fs (loop6): Unrecognized mount option "017777777777777777777771844674407370955161500000000000000000000004" or missing value [ 130.279387] loop1: detected capacity change from 0 to 264192 [ 130.283095] FAT-fs (loop1): Unrecognized mount option "017777777777777777777771844674407370955161500000000000000000000004" or missing value [ 130.295848] FAT-fs (loop7): Unrecognized mount option "000000000000071034567161844674407370955161500000000000000000000004" or missing value 12:07:02 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) setrlimit(0x0, &(0x7f0000002000)) [ 130.326925] loop5: detected capacity change from 0 to 264192 [ 130.333471] FAT-fs (loop5): Unrecognized mount option "017777777777777777777771844674407370955161500000000000000000000004" or missing value [ 130.344018] FAT-fs (loop2): Unrecognized mount option "000000000000013470636471844674407370955161500000000000000000000004" or missing value [ 130.392889] loop0: detected capacity change from 0 to 264192 [ 130.400309] FAT-fs (loop0): Unrecognized mount option "017777777777777777777771844674407370955161500000000000000000000004" or missing value 12:07:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x1d, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1500}, {&(0x7f0000010e00)="20000000e85575eae85575ea00000000d1f4655f00"/32, 0x20, 0x1580}, {&(0x7f0000010f00)="8081000000300404d1f4655fd1f4655fd1f4655f00000000000001002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000d1f4655f00"/160, 0xa0, 0x1a00}, {&(0x7f0000011000)="c0410000002c0000d1f4655fd1f4655fd1f4655f00000000000002002000000000000800000000000af301000400000000000000000000000b00000020000000", 0x40, 0x1e00}, {&(0x7f0000011100)="20000000000000000000000000000000d1f4655f000000000000000000000000000002ea00"/64, 0x40, 0x1e80}, {&(0x7f0000011200)="ed4100003c000000d1f4655fd1f4655fd1f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c6531000000000000000000000000000000000000000000000000000000d908479700000000000000000000000000000000000000000000000020000000e85575eae85575eae85575ead1f4655fe85575ea0000000000000000000002ea04070000000000000000000000000000646174610000000000000000", 0xc0, 0x1f00}, {&(0x7f0000011300)="ed8100001a040000d1f4655fd1f4655fd1f4655f00000000000001002000000000000800010000000af30100040000000000000000000000020000005000000000000000000000000000000000000000000000000000000000000000000000000000000090dc20e700000000000000000000000000000000000000000000000020000000e85575eae85575eae85575ead1f4655fe85575ea0000000000000000", 0xa0, 0x2000}, {&(0x7f0000011400)="ffa1000026000000d1f4655fd1f4655fd1f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3731333231363534352f66696c65302f66696c65300000000000000000000000000000000000000000000009d0860300000000000000000000000000000000000000000000000020000000e85575eae85575eae85575ead1f4655fe85575ea0000000000000000", 0xa0, 0x2100}, {&(0x7f0000011500)="ed8100000a000000d1f4655fd1f4655fd1f4655f000000000000010000000000000000100100000073797a6b616c6c6572730000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000224d02d700000000000000000000000000000000000000000000000020000000e85575eae85575eae85575ead1f4655fe85575ea0000000000000000000002ea040700000000000000000000000000006461746106015400000000000600000000000000786174747231000006014c000000000006000000000000007861747472320000000000000000000078617474723200007861747472310000ed81000028230000d1f4655fd1f4655fd1f4655f00000000000002002000000000000800010000000af3010004000000000000000000000009000000600000000000000000000000000000000000000000000000000000000000000000000000000000004076a5e500000000000000000000000000000000000000000000000020000000e85575eae85575eae85575ead1f4655fe85575ea0000000000000000", 0x1a0, 0x2200}, {&(0x7f0000011700)="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", 0x100, 0x2400}, {&(0x7f0000011800)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009403090166696c652e636f6c64000000", 0x80, 0x4000}, {&(0x7f0000011900)="0b0000000c0001022e000000020000000c0002022e2e000000000000e8030000", 0x20, 0x8000}, {&(0x7f0000011a00)="00000000000400"/32, 0x20, 0x8400}, {&(0x7f0000011b00)="00000000000400"/32, 0x20, 0x8800}, {&(0x7f0000011c00)="00000000000400"/32, 0x20, 0x8c00}, {&(0x7f0000011d00)="00000000000400"/32, 0x20, 0x9000}, {&(0x7f0000011e00)="00000000000400"/32, 0x20, 0x9400}, {&(0x7f0000011f00)="00000000000400"/32, 0x20, 0x9800}, {&(0x7f0000012000)="00000000000400"/32, 0x20, 0x9c00}, {&(0x7f0000012100)="00000000000400"/32, 0x20, 0xa000}, {&(0x7f0000012200)="00000000000400"/32, 0x20, 0xa400}, {&(0x7f0000012300)="00000000000400"/32, 0x20, 0xa800}, {&(0x7f0000012400)="504d4d00504d4dffd1f4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033310075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/128, 0x80, 0x10000}, {&(0x7f0000012500)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x14000}], 0x0, &(0x7f0000012a00)) 12:07:02 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f800 VM DIAGNOSIS: 12:06:55 Registers: info registers vcpu 0 RAX=ffffffff8135aebc RBX=0000000000000001 RCX=1ffff11007cf8e7b RDX=dffffc0000000000 RSI=ffff88803e7c7420 RDI=ffff88803e7c7420 RBP=ffff88803e7c73d8 RSP=ffff88803e7c72a8 R8 =ffffffff85e351e0 R9 =ffffffff85e351e4 R10=ffffed1007cf8e7d R11=ffff88803e7c73c0 R12=ffff88803e7c73c1 R13=ffff88803e7c73e0 R14=ffff88803e7c7380 R15=ffffffff85e351e5 RIP=ffffffff8111aaf3 RFL=00000216 [----AP-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ffc6b5a5f80 CR3=0000000017696000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=756e696c2d34365f3638782f62696c2f XMM01=00362e6f732e6362696c2f756e672d78 XMM02=ffff0000000000ffffffffffffffffff XMM03=ffffffffffffffffffffffffffffffff XMM04=00000000000000000000000000000000 XMM05=00000000000000000000000000000000 XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=000000000000002e RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff823bda91 RDI=ffffffff8765c9a0 RBP=ffffffff8765c960 RSP=ffff888020a97690 R8 =0000000000000001 R9 =000000000000000a R10=000000000000002e R11=0000000000000001 R12=000000000000002e R13=ffffffff8765c960 R14=0000000000000010 R15=ffffffff823bda80 RIP=ffffffff823bdae9 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007ff0f1b1d700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fc4981f46f4 CR3=000000000f092000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00007ff0f468e7c000007ff0f468e7c8 XMM02=00007ff0f468e7e000007ff0f468e7c0 XMM03=00007ff0f468e7c800007ff0f468e7c0 XMM04=ffffffffffffffffffffffff00000000 XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000