Warning: Permanently added '[localhost]:48589' (ECDSA) to the list of known hosts. 2022/09/29 02:42:49 fuzzer started 2022/09/29 02:42:50 dialing manager at localhost:45751 syzkaller login: [ 40.088814] cgroup: Unknown subsys name 'net' [ 40.176493] cgroup: Unknown subsys name 'rlimit' 2022/09/29 02:43:05 syscalls: 2215 2022/09/29 02:43:05 code coverage: enabled 2022/09/29 02:43:05 comparison tracing: enabled 2022/09/29 02:43:05 extra coverage: enabled 2022/09/29 02:43:05 setuid sandbox: enabled 2022/09/29 02:43:05 namespace sandbox: enabled 2022/09/29 02:43:05 Android sandbox: enabled 2022/09/29 02:43:05 fault injection: enabled 2022/09/29 02:43:05 leak checking: enabled 2022/09/29 02:43:05 net packet injection: enabled 2022/09/29 02:43:05 net device setup: enabled 2022/09/29 02:43:05 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/29 02:43:05 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/29 02:43:05 USB emulation: enabled 2022/09/29 02:43:05 hci packet injection: enabled 2022/09/29 02:43:05 wifi device emulation: failed to parse kernel version (6.0.0-rc7-next-20220928) 2022/09/29 02:43:05 802.15.4 emulation: enabled 2022/09/29 02:43:05 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/29 02:43:05 fetching corpus: 50, signal 21026/24339 (executing program) 2022/09/29 02:43:05 fetching corpus: 100, signal 36165/40430 (executing program) 2022/09/29 02:43:05 fetching corpus: 150, signal 45417/50550 (executing program) 2022/09/29 02:43:05 fetching corpus: 200, signal 52860/58588 (executing program) 2022/09/29 02:43:05 fetching corpus: 250, signal 56888/63355 (executing program) 2022/09/29 02:43:05 fetching corpus: 300, signal 62911/69752 (executing program) 2022/09/29 02:43:05 fetching corpus: 350, signal 65057/72589 (executing program) 2022/09/29 02:43:06 fetching corpus: 400, signal 67623/75729 (executing program) 2022/09/29 02:43:06 fetching corpus: 450, signal 71311/79699 (executing program) 2022/09/29 02:43:06 fetching corpus: 500, signal 76406/84700 (executing program) 2022/09/29 02:43:06 fetching corpus: 550, signal 79428/87916 (executing program) 2022/09/29 02:43:06 fetching corpus: 600, signal 83854/92168 (executing program) 2022/09/29 02:43:06 fetching corpus: 650, signal 85934/94433 (executing program) 2022/09/29 02:43:06 fetching corpus: 700, signal 87733/96413 (executing program) 2022/09/29 02:43:06 fetching corpus: 750, signal 90957/99442 (executing program) 2022/09/29 02:43:07 fetching corpus: 800, signal 92587/101179 (executing program) 2022/09/29 02:43:07 fetching corpus: 850, signal 94129/102818 (executing program) 2022/09/29 02:43:07 fetching corpus: 900, signal 95536/104298 (executing program) 2022/09/29 02:43:07 fetching corpus: 950, signal 96569/105415 (executing program) 2022/09/29 02:43:07 fetching corpus: 1000, signal 97893/106743 (executing program) 2022/09/29 02:43:07 fetching corpus: 1050, signal 99953/108472 (executing program) 2022/09/29 02:43:07 fetching corpus: 1100, signal 102254/110310 (executing program) 2022/09/29 02:43:07 fetching corpus: 1150, signal 104051/111705 (executing program) 2022/09/29 02:43:08 fetching corpus: 1200, signal 105299/112774 (executing program) 2022/09/29 02:43:08 fetching corpus: 1250, signal 107301/114214 (executing program) 2022/09/29 02:43:08 fetching corpus: 1300, signal 109013/115422 (executing program) 2022/09/29 02:43:08 fetching corpus: 1350, signal 112262/117523 (executing program) 2022/09/29 02:43:08 fetching corpus: 1400, signal 114763/118977 (executing program) 2022/09/29 02:43:08 fetching corpus: 1450, signal 116785/120143 (executing program) 2022/09/29 02:43:09 fetching corpus: 1500, signal 117951/120847 (executing program) 2022/09/29 02:43:09 fetching corpus: 1549, signal 118895/121478 (executing program) 2022/09/29 02:43:09 fetching corpus: 1549, signal 118895/121575 (executing program) 2022/09/29 02:43:09 fetching corpus: 1549, signal 118895/121657 (executing program) 2022/09/29 02:43:09 fetching corpus: 1549, signal 118895/121734 (executing program) 2022/09/29 02:43:09 fetching corpus: 1549, signal 118895/121810 (executing program) 2022/09/29 02:43:09 fetching corpus: 1549, signal 118895/121888 (executing program) 2022/09/29 02:43:09 fetching corpus: 1549, signal 118895/121960 (executing program) 2022/09/29 02:43:09 fetching corpus: 1549, signal 118895/122037 (executing program) 2022/09/29 02:43:09 fetching corpus: 1549, signal 118895/122117 (executing program) 2022/09/29 02:43:09 fetching corpus: 1549, signal 118895/122195 (executing program) 2022/09/29 02:43:09 fetching corpus: 1549, signal 118895/122275 (executing program) 2022/09/29 02:43:09 fetching corpus: 1549, signal 118895/122359 (executing program) 2022/09/29 02:43:09 fetching corpus: 1549, signal 118895/122439 (executing program) 2022/09/29 02:43:09 fetching corpus: 1549, signal 118895/122516 (executing program) 2022/09/29 02:43:09 fetching corpus: 1549, signal 118895/122602 (executing program) 2022/09/29 02:43:09 fetching corpus: 1549, signal 118895/122704 (executing program) 2022/09/29 02:43:09 fetching corpus: 1549, signal 118895/122790 (executing program) 2022/09/29 02:43:09 fetching corpus: 1549, signal 118895/122853 (executing program) 2022/09/29 02:43:09 fetching corpus: 1549, signal 118895/122930 (executing program) 2022/09/29 02:43:09 fetching corpus: 1549, signal 118895/123025 (executing program) 2022/09/29 02:43:09 fetching corpus: 1549, signal 118895/123112 (executing program) 2022/09/29 02:43:09 fetching corpus: 1549, signal 118895/123186 (executing program) 2022/09/29 02:43:09 fetching corpus: 1549, signal 118895/123270 (executing program) 2022/09/29 02:43:09 fetching corpus: 1549, signal 118895/123360 (executing program) 2022/09/29 02:43:09 fetching corpus: 1549, signal 118895/123438 (executing program) 2022/09/29 02:43:09 fetching corpus: 1549, signal 118895/123518 (executing program) 2022/09/29 02:43:09 fetching corpus: 1549, signal 118895/123583 (executing program) 2022/09/29 02:43:09 fetching corpus: 1549, signal 118895/123674 (executing program) 2022/09/29 02:43:09 fetching corpus: 1549, signal 118895/123742 (executing program) 2022/09/29 02:43:09 fetching corpus: 1549, signal 118895/123833 (executing program) 2022/09/29 02:43:09 fetching corpus: 1549, signal 118895/123839 (executing program) 2022/09/29 02:43:09 fetching corpus: 1549, signal 118895/123839 (executing program) 2022/09/29 02:43:11 starting 8 fuzzer processes 02:43:11 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='.\x00', 0x0, 0x0, &(0x7f0000001300), 0x800010, &(0x7f0000000380)=ANY=[@ANYRESOCT, @ANYRES32=r1, @ANYRESDEC=r0, @ANYRES16, @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)=0x4000) getpeername$unix(r2, &(0x7f0000000300)=@abs, &(0x7f0000000200)=0x6e) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) 02:43:11 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) 02:43:11 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000080)={r3, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r3, 0x3, 0x6, @link_local}, 0x10) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) close_range(r0, r0, 0x0) 02:43:11 executing program 2: socket$inet(0x2, 0xa, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) socketpair(0x11, 0x2, 0x3, &(0x7f0000000040)) 02:43:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x17, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028020000028401001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35313233303831343700"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000b00cb2cc029f49d8b90449a7ecd54d49010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000002e00000000000000", 0x40, 0x540}, {&(0x7f0000010300)="0000000000000000000000000000000000000000010400"/32, 0x20, 0x640}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000010500)="ffff3f00000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000dff4655fdff4655fdff4655f00"/4128, 0x1020, 0x1000}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004000400000000000000050000000800"/64, 0x40, 0x2100}, {&(0x7f0000011700)="20000000b45b976cb45b976c00000000dff4655f00"/32, 0x20, 0x2180}, {&(0x7f0000011800)="c041000000380000dff4655fdff4655fdff4655f00000000000002001c0000000000000000000000090000000a0000000b0000000c0000000d0000000e0000000f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000dff4655f000000000000000000000000000002ea00"/192, 0xc0, 0x2a00}, {&(0x7f0000011900)="ed4100003c000000e0f4655fe0f4655fe0f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000024a8270e00000000000000000000000000000000000000000000000020000000b45b976cb45b976cb45b976ce0f4655fb45b976c0000000000000000000002ea04070000000000000000000000000000646174610000000000000000", 0xc0, 0x2b00}, {&(0x7f0000011a00)="ed8100001a040000e0f4655fe0f4655fe0f4655f000000000000010004000000000000000100000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000038ac705900000000000000000000000000000000000000000000000020000000b45b976cb45b976cb45b976ce0f4655fb45b976c0000000000000000", 0xa0, 0x2c00}, {&(0x7f0000011b00)="ffa1000026000000e0f4655fe0f4655fe0f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3531323330383134372f66696c65302f66696c653000000000000000000000000000000000000000000000ae39138600000000000000000000000000000000000000000000000020000000b45b976cb45b976cb45b976ce0f4655fb45b976c0000000000000000", 0xa0, 0x2d00}, {&(0x7f0000011c00)="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", 0x1a0, 0x2e00}, {&(0x7f0000011e00)="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", 0x100, 0x3000}, {&(0x7f0000011f00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x80, 0x4000}, {&(0x7f0000012000)="0b0000000c0001022e000000020000000c0002022e2e000000000000e8070000", 0x20, 0x4800}, {&(0x7f0000012100)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x5000}, {&(0x7f0000012200)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x5800}, {&(0x7f0000012300)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x6000}, {&(0x7f0000012400)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x6800}, {&(0x7f0000012500)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x7000}, {&(0x7f0000012600)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x7800}, {&(0x7f0000012700)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x8000}], 0x0, &(0x7f0000012c00)) [ 61.372641] audit: type=1400 audit(1664419391.604:6): avc: denied { execmem } for pid=284 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 02:43:11 executing program 5: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) 02:43:11 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) sendmmsg$inet6(r0, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)='*', 0x1}], 0x1}}], 0x1, 0x4000001) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) 02:43:11 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$SNAPSHOT_S2RAM(r0, 0x330b) [ 62.625196] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 62.628071] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 62.629884] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 62.632235] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 62.634612] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 62.637237] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 62.639017] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 62.641087] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 62.644257] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 62.645440] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 62.647718] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 62.650020] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 62.654417] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 62.657020] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 62.660304] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 62.662521] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 62.665592] Bluetooth: hci1: HCI_REQ-0x0c1a [ 62.670640] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 62.671652] Bluetooth: hci2: HCI_REQ-0x0c1a [ 62.671964] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 62.678910] Bluetooth: hci0: HCI_REQ-0x0c1a [ 62.699251] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 62.709296] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 62.711719] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 62.723143] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 62.725150] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 62.727872] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 62.731342] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 62.733448] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 62.735990] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 62.742830] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 62.745399] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 62.750687] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 62.758086] Bluetooth: hci7: HCI_REQ-0x0c1a [ 62.761762] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 62.763815] Bluetooth: hci5: HCI_REQ-0x0c1a [ 62.764158] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 62.768049] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 62.786431] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 62.788008] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 62.801028] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 62.802160] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 62.803404] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 62.805394] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 62.817878] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 62.819130] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 62.822801] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 62.824109] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 62.827837] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 62.829456] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 62.834833] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 62.836020] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 62.845756] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 62.858620] Bluetooth: hci6: HCI_REQ-0x0c1a [ 62.866776] Bluetooth: hci3: HCI_REQ-0x0c1a [ 62.897216] Bluetooth: hci4: HCI_REQ-0x0c1a [ 64.697941] Bluetooth: hci1: command 0x0409 tx timeout [ 64.698655] Bluetooth: hci2: command 0x0409 tx timeout [ 64.761551] Bluetooth: hci0: command 0x0409 tx timeout [ 64.825574] Bluetooth: hci5: command 0x0409 tx timeout [ 64.826162] Bluetooth: hci7: command 0x0409 tx timeout [ 64.889564] Bluetooth: hci6: command 0x0409 tx timeout [ 64.953810] Bluetooth: hci4: command 0x0409 tx timeout [ 64.954320] Bluetooth: hci3: command 0x0409 tx timeout [ 66.745658] Bluetooth: hci2: command 0x041b tx timeout [ 66.746157] Bluetooth: hci1: command 0x041b tx timeout [ 66.809567] Bluetooth: hci0: command 0x041b tx timeout [ 66.873528] Bluetooth: hci7: command 0x041b tx timeout [ 66.874113] Bluetooth: hci5: command 0x041b tx timeout [ 66.937592] Bluetooth: hci6: command 0x041b tx timeout [ 67.001538] Bluetooth: hci3: command 0x041b tx timeout [ 67.002024] Bluetooth: hci4: command 0x041b tx timeout [ 68.793535] Bluetooth: hci1: command 0x040f tx timeout [ 68.793981] Bluetooth: hci2: command 0x040f tx timeout [ 68.857612] Bluetooth: hci0: command 0x040f tx timeout [ 68.921549] Bluetooth: hci5: command 0x040f tx timeout [ 68.922003] Bluetooth: hci7: command 0x040f tx timeout [ 68.985558] Bluetooth: hci6: command 0x040f tx timeout [ 69.049895] Bluetooth: hci4: command 0x040f tx timeout [ 69.050347] Bluetooth: hci3: command 0x040f tx timeout [ 70.841576] Bluetooth: hci2: command 0x0419 tx timeout [ 70.842052] Bluetooth: hci1: command 0x0419 tx timeout [ 70.905530] Bluetooth: hci0: command 0x0419 tx timeout [ 70.969549] Bluetooth: hci7: command 0x0419 tx timeout [ 70.969960] Bluetooth: hci5: command 0x0419 tx timeout [ 71.033576] Bluetooth: hci6: command 0x0419 tx timeout [ 71.097524] Bluetooth: hci3: command 0x0419 tx timeout [ 71.097932] Bluetooth: hci4: command 0x0419 tx timeout [ 119.333648] loop4: detected capacity change from 0 to 512 [ 119.397957] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. 02:44:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x17, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028020000028401001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35313233303831343700"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000b00cb2cc029f49d8b90449a7ecd54d49010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000002e00000000000000", 0x40, 0x540}, {&(0x7f0000010300)="0000000000000000000000000000000000000000010400"/32, 0x20, 0x640}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000010500)="ffff3f00000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000dff4655fdff4655fdff4655f00"/4128, 0x1020, 0x1000}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004000400000000000000050000000800"/64, 0x40, 0x2100}, {&(0x7f0000011700)="20000000b45b976cb45b976c00000000dff4655f00"/32, 0x20, 0x2180}, {&(0x7f0000011800)="c041000000380000dff4655fdff4655fdff4655f00000000000002001c0000000000000000000000090000000a0000000b0000000c0000000d0000000e0000000f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000dff4655f000000000000000000000000000002ea00"/192, 0xc0, 0x2a00}, {&(0x7f0000011900)="ed4100003c000000e0f4655fe0f4655fe0f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000024a8270e00000000000000000000000000000000000000000000000020000000b45b976cb45b976cb45b976ce0f4655fb45b976c0000000000000000000002ea04070000000000000000000000000000646174610000000000000000", 0xc0, 0x2b00}, {&(0x7f0000011a00)="ed8100001a040000e0f4655fe0f4655fe0f4655f000000000000010004000000000000000100000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000038ac705900000000000000000000000000000000000000000000000020000000b45b976cb45b976cb45b976ce0f4655fb45b976c0000000000000000", 0xa0, 0x2c00}, {&(0x7f0000011b00)="ffa1000026000000e0f4655fe0f4655fe0f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3531323330383134372f66696c65302f66696c653000000000000000000000000000000000000000000000ae39138600000000000000000000000000000000000000000000000020000000b45b976cb45b976cb45b976ce0f4655fb45b976c0000000000000000", 0xa0, 0x2d00}, {&(0x7f0000011c00)="ed8100000a000000e0f4655fe0f4655fe0f4655f000000000000010000000000000000100100000073797a6b616c6c6572730000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000eabcf5b900000000000000000000000000000000000000000000000020000000b45b976cb45b976cb45b976ce0f4655fb45b976c0000000000000000000002ea040700000000000000000000000000006461746106015400000000000600000000000000786174747231000006014c000000000006000000000000007861747472320000000000000000000078617474723200007861747472310000ed81000028230000e0f4655fe0f4655fe0f4655f0000000000000200140000000000000001000000110000001200000013000000140000001500000000000000000000000000000000000000000000000000000000000000000000000000000000000000c28dc86400000000000000000000000000000000000000000000000020000000b45b976cb45b976cb45b976ce0f4655fb45b976c0000000000000000", 0x1a0, 0x2e00}, {&(0x7f0000011e00)="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", 0x100, 0x3000}, {&(0x7f0000011f00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x80, 0x4000}, {&(0x7f0000012000)="0b0000000c0001022e000000020000000c0002022e2e000000000000e8070000", 0x20, 0x4800}, {&(0x7f0000012100)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x5000}, {&(0x7f0000012200)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x5800}, {&(0x7f0000012300)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x6000}, {&(0x7f0000012400)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x6800}, {&(0x7f0000012500)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x7000}, {&(0x7f0000012600)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x7800}, {&(0x7f0000012700)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x8000}], 0x0, &(0x7f0000012c00)) [ 119.524447] EXT4-fs (loop4): unmounting filesystem. [ 119.675209] loop4: detected capacity change from 0 to 512 [ 119.705172] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. 02:44:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x17, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028020000028401001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35313233303831343700"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000b00cb2cc029f49d8b90449a7ecd54d49010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000002e00000000000000", 0x40, 0x540}, {&(0x7f0000010300)="0000000000000000000000000000000000000000010400"/32, 0x20, 0x640}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000010500)="ffff3f00000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000dff4655fdff4655fdff4655f00"/4128, 0x1020, 0x1000}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004000400000000000000050000000800"/64, 0x40, 0x2100}, {&(0x7f0000011700)="20000000b45b976cb45b976c00000000dff4655f00"/32, 0x20, 0x2180}, {&(0x7f0000011800)="c041000000380000dff4655fdff4655fdff4655f00000000000002001c0000000000000000000000090000000a0000000b0000000c0000000d0000000e0000000f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000dff4655f000000000000000000000000000002ea00"/192, 0xc0, 0x2a00}, {&(0x7f0000011900)="ed4100003c000000e0f4655fe0f4655fe0f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000024a8270e00000000000000000000000000000000000000000000000020000000b45b976cb45b976cb45b976ce0f4655fb45b976c0000000000000000000002ea04070000000000000000000000000000646174610000000000000000", 0xc0, 0x2b00}, {&(0x7f0000011a00)="ed8100001a040000e0f4655fe0f4655fe0f4655f000000000000010004000000000000000100000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000038ac705900000000000000000000000000000000000000000000000020000000b45b976cb45b976cb45b976ce0f4655fb45b976c0000000000000000", 0xa0, 0x2c00}, {&(0x7f0000011b00)="ffa1000026000000e0f4655fe0f4655fe0f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3531323330383134372f66696c65302f66696c653000000000000000000000000000000000000000000000ae39138600000000000000000000000000000000000000000000000020000000b45b976cb45b976cb45b976ce0f4655fb45b976c0000000000000000", 0xa0, 0x2d00}, {&(0x7f0000011c00)="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", 0x1a0, 0x2e00}, {&(0x7f0000011e00)="ed81000064000000e0f4655fe0f4655fe0f4655f000000000000010000000000000000100100000073797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c412e2ee000000000000000000000000000000000000000000000000020000000b45b976cb45b976cb45b976ce0f4655fb45b976c0000000000000000000002ea040734000000000028000000000000006461746100000000000000000000000000000000000000000000000000000000000000006c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273", 0x100, 0x3000}, {&(0x7f0000011f00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x80, 0x4000}, {&(0x7f0000012000)="0b0000000c0001022e000000020000000c0002022e2e000000000000e8070000", 0x20, 0x4800}, {&(0x7f0000012100)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x5000}, {&(0x7f0000012200)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x5800}, {&(0x7f0000012300)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x6000}, {&(0x7f0000012400)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x6800}, {&(0x7f0000012500)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x7000}, {&(0x7f0000012600)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x7800}, {&(0x7f0000012700)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x8000}], 0x0, &(0x7f0000012c00)) [ 119.848899] EXT4-fs (loop4): unmounting filesystem. [ 119.956031] loop4: detected capacity change from 0 to 512 [ 119.999120] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 120.093008] EXT4-fs (loop4): unmounting filesystem. 02:44:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x17, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001000028020000028401001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35313233303831343700"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000b00cb2cc029f49d8b90449a7ecd54d49010000000c00000000000000dff4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000002e00000000000000", 0x40, 0x540}, {&(0x7f0000010300)="0000000000000000000000000000000000000000010400"/32, 0x20, 0x640}, {&(0x7f0000010400)="0200000003000000040000006a000f000300040000000000000000000f00bc0f", 0x20, 0x800}, {&(0x7f0000010500)="ffff3f00000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000dff4655fdff4655fdff4655f00"/4128, 0x1020, 0x1000}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004000400000000000000050000000800"/64, 0x40, 0x2100}, {&(0x7f0000011700)="20000000b45b976cb45b976c00000000dff4655f00"/32, 0x20, 0x2180}, {&(0x7f0000011800)="c041000000380000dff4655fdff4655fdff4655f00000000000002001c0000000000000000000000090000000a0000000b0000000c0000000d0000000e0000000f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000dff4655f000000000000000000000000000002ea00"/192, 0xc0, 0x2a00}, {&(0x7f0000011900)="ed4100003c000000e0f4655fe0f4655fe0f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000024a8270e00000000000000000000000000000000000000000000000020000000b45b976cb45b976cb45b976ce0f4655fb45b976c0000000000000000000002ea04070000000000000000000000000000646174610000000000000000", 0xc0, 0x2b00}, {&(0x7f0000011a00)="ed8100001a040000e0f4655fe0f4655fe0f4655f000000000000010004000000000000000100000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000038ac705900000000000000000000000000000000000000000000000020000000b45b976cb45b976cb45b976ce0f4655fb45b976c0000000000000000", 0xa0, 0x2c00}, {&(0x7f0000011b00)="ffa1000026000000e0f4655fe0f4655fe0f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3531323330383134372f66696c65302f66696c653000000000000000000000000000000000000000000000ae39138600000000000000000000000000000000000000000000000020000000b45b976cb45b976cb45b976ce0f4655fb45b976c0000000000000000", 0xa0, 0x2d00}, {&(0x7f0000011c00)="ed8100000a000000e0f4655fe0f4655fe0f4655f000000000000010000000000000000100100000073797a6b616c6c6572730000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000eabcf5b900000000000000000000000000000000000000000000000020000000b45b976cb45b976cb45b976ce0f4655fb45b976c0000000000000000000002ea040700000000000000000000000000006461746106015400000000000600000000000000786174747231000006014c000000000006000000000000007861747472320000000000000000000078617474723200007861747472310000ed81000028230000e0f4655fe0f4655fe0f4655f0000000000000200140000000000000001000000110000001200000013000000140000001500000000000000000000000000000000000000000000000000000000000000000000000000000000000000c28dc86400000000000000000000000000000000000000000000000020000000b45b976cb45b976cb45b976ce0f4655fb45b976c0000000000000000", 0x1a0, 0x2e00}, {&(0x7f0000011e00)="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", 0x100, 0x3000}, {&(0x7f0000011f00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x80, 0x4000}, {&(0x7f0000012000)="0b0000000c0001022e000000020000000c0002022e2e000000000000e8070000", 0x20, 0x4800}, {&(0x7f0000012100)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x5000}, {&(0x7f0000012200)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x5800}, {&(0x7f0000012300)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x6000}, {&(0x7f0000012400)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x6800}, {&(0x7f0000012500)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x7000}, {&(0x7f0000012600)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x7800}, {&(0x7f0000012700)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x8000}], 0x0, &(0x7f0000012c00)) [ 120.195522] loop4: detected capacity change from 0 to 512 [ 120.218121] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 120.351576] EXT4-fs (loop4): unmounting filesystem. 02:44:10 executing program 4: mount$9p_rdma(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0)) syz_mount_image$tmpfs(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000001880)) chown(&(0x7f0000001900)='./file0\x00', 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000001c00)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = syz_mount_image$vfat(&(0x7f0000002040), &(0x7f0000002080)='./file0\x00', 0x0, 0x7, &(0x7f00000025c0)=[{&(0x7f00000020c0)="82cd02898db7ce1f4268ddd494538936c6a25a32f5af667a950cef344530a0bfc40d426b28af12968fa03752ee67abaa74fb9769cb3cb9b1588cb0b5c5933a24725b9600e8217da8cc829fc0cec78358f051a8bc527a115506b62137a00ec9e2c66e83e52fb617f0ba87ef199d92364e126e26a619c51161d5cdeff8f01ad7197a9643957ded36334946280f3a8f72201f94f4753c31c0c41449b1b9e9c48925196137f7cab0a4cfc56ac63701489c7626246ea1b3912070", 0xb8, 0x10001}, {&(0x7f0000002180)="4a616c0efab00a21645b7d9e4fd416181ed260b140e55d615ea4a40fd0427e79d519994cd3b4d6a5813746d1caf8cce57a5d3c1eb0b42617116d2fe30f27d06534438e7e4764d851b4eaa926ce54272060aa36af27bf5b37ac7ee1e18b6d68ceb02b2894f00cd7085d000abff4ad01c9628dc4005d725ae92764088ad936d92c226cbbea906e782c47a83f918866080a3bf2234aaae403b57005d44ab04e2d817bb8c104824f935a5ebee0f18c699458cb98b05598", 0xb5, 0x1}, {&(0x7f0000002240)="41a977bdf4d7", 0x6, 0x100000001}, {&(0x7f0000002280)="d392361ce7cd6db4480e8808af42b30d7ee818021f2787d498a5610e67bc6fcb4978402d8ab792eedb5826bef0564ac7bc683329a7f8a74810e5e1e197fcc2d256b724082b169910d0f6768ffa9ada00aab08a355f022ea09b6cf2d3b192cd5308f21e7a9b5165c42913ac699bf13abf588cee579454", 0x76, 0x27c5}, {&(0x7f0000002300)="ae8d8866", 0x4, 0x9}, {&(0x7f0000002340)="e8d4ced7f8166169ae6fea9ff7025720bd3ab414b3b0e62072f292a7e1f92a05ff4fa82844ff8b36e0302f04d03b150c6f99cd1e3608f3c07966254a08f547917b1b7a34048840e9d60dc47fda18ca276c92459928d3e714cfdcadad716bfde59f49920311914b2ea19a36c05f672ecbfad85e1b3eb1ec1d72555ea3fa452d8c9dd979b60a0db7a9787ecd55d6c5b7558b4e0382d402400854c8e4da4faafb67c589f410d9125b079c0e9dc2a4f249e045e06fe759f3b74598cd9ec00e2147b7af87f5b2ec2dd19e9e6fab16fe072abfd522aa158f1dd1a9c954776ad25b30061d624bb618911737dbd3482f74cde272d462283b07f403147c", 0xf9, 0x2}, {0x0, 0x0, 0x62}], 0x200000, &(0x7f00000026c0)={[{@utf8no}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'macturkish'}}], [{@fsuuid={'fsuuid', 0x3d, {[0x31, 0x36, 0x32, 0x63, 0x30, 0x0, 0x55, 0x35], 0x2d, [0x36, 0x61, 0x61, 0x35], 0x2d, [0x37, 0x64, 0x32], 0x2d, [0xb, 0x60, 0x5, 0x35], 0x2d, [0x61, 0x5, 0x0, 0x32, 0x39, 0x37, 0x61, 0x34]}}}, {@uid_eq}, {@dont_hash}]}) fspick(r0, &(0x7f0000002740)='./file0\x00', 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000004200)) [ 120.507216] loop4: detected capacity change from 0 to 264192 [ 120.522100] FAT-fs (loop4): Unrecognized mount option "fsuuid=162c0" or missing value 02:44:10 executing program 4: mount$9p_rdma(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0)) syz_mount_image$tmpfs(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000001880)) chown(&(0x7f0000001900)='./file0\x00', 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000001c00)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = syz_mount_image$vfat(&(0x7f0000002040), &(0x7f0000002080)='./file0\x00', 0x0, 0x7, &(0x7f00000025c0)=[{&(0x7f00000020c0)="82cd02898db7ce1f4268ddd494538936c6a25a32f5af667a950cef344530a0bfc40d426b28af12968fa03752ee67abaa74fb9769cb3cb9b1588cb0b5c5933a24725b9600e8217da8cc829fc0cec78358f051a8bc527a115506b62137a00ec9e2c66e83e52fb617f0ba87ef199d92364e126e26a619c51161d5cdeff8f01ad7197a9643957ded36334946280f3a8f72201f94f4753c31c0c41449b1b9e9c48925196137f7cab0a4cfc56ac63701489c7626246ea1b3912070", 0xb8, 0x10001}, {&(0x7f0000002180)="4a616c0efab00a21645b7d9e4fd416181ed260b140e55d615ea4a40fd0427e79d519994cd3b4d6a5813746d1caf8cce57a5d3c1eb0b42617116d2fe30f27d06534438e7e4764d851b4eaa926ce54272060aa36af27bf5b37ac7ee1e18b6d68ceb02b2894f00cd7085d000abff4ad01c9628dc4005d725ae92764088ad936d92c226cbbea906e782c47a83f918866080a3bf2234aaae403b57005d44ab04e2d817bb8c104824f935a5ebee0f18c699458cb98b05598", 0xb5, 0x1}, {&(0x7f0000002240)="41a977bdf4d7", 0x6, 0x100000001}, {&(0x7f0000002280)="d392361ce7cd6db4480e8808af42b30d7ee818021f2787d498a5610e67bc6fcb4978402d8ab792eedb5826bef0564ac7bc683329a7f8a74810e5e1e197fcc2d256b724082b169910d0f6768ffa9ada00aab08a355f022ea09b6cf2d3b192cd5308f21e7a9b5165c42913ac699bf13abf588cee579454", 0x76, 0x27c5}, {&(0x7f0000002300)="ae8d8866", 0x4, 0x9}, {&(0x7f0000002340)="e8d4ced7f8166169ae6fea9ff7025720bd3ab414b3b0e62072f292a7e1f92a05ff4fa82844ff8b36e0302f04d03b150c6f99cd1e3608f3c07966254a08f547917b1b7a34048840e9d60dc47fda18ca276c92459928d3e714cfdcadad716bfde59f49920311914b2ea19a36c05f672ecbfad85e1b3eb1ec1d72555ea3fa452d8c9dd979b60a0db7a9787ecd55d6c5b7558b4e0382d402400854c8e4da4faafb67c589f410d9125b079c0e9dc2a4f249e045e06fe759f3b74598cd9ec00e2147b7af87f5b2ec2dd19e9e6fab16fe072abfd522aa158f1dd1a9c954776ad25b30061d624bb618911737dbd3482f74cde272d462283b07f403147c", 0xf9, 0x2}, {0x0, 0x0, 0x62}], 0x200000, &(0x7f00000026c0)={[{@utf8no}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'macturkish'}}], [{@fsuuid={'fsuuid', 0x3d, {[0x31, 0x36, 0x32, 0x63, 0x30, 0x0, 0x55, 0x35], 0x2d, [0x36, 0x61, 0x61, 0x35], 0x2d, [0x37, 0x64, 0x32], 0x2d, [0xb, 0x60, 0x5, 0x35], 0x2d, [0x61, 0x5, 0x0, 0x32, 0x39, 0x37, 0x61, 0x34]}}}, {@uid_eq}, {@dont_hash}]}) fspick(r0, &(0x7f0000002740)='./file0\x00', 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000004200)) 02:44:11 executing program 4: mount$9p_rdma(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0)) syz_mount_image$tmpfs(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000001880)) chown(&(0x7f0000001900)='./file0\x00', 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000001c00)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = syz_mount_image$vfat(&(0x7f0000002040), &(0x7f0000002080)='./file0\x00', 0x0, 0x7, &(0x7f00000025c0)=[{&(0x7f00000020c0)="82cd02898db7ce1f4268ddd494538936c6a25a32f5af667a950cef344530a0bfc40d426b28af12968fa03752ee67abaa74fb9769cb3cb9b1588cb0b5c5933a24725b9600e8217da8cc829fc0cec78358f051a8bc527a115506b62137a00ec9e2c66e83e52fb617f0ba87ef199d92364e126e26a619c51161d5cdeff8f01ad7197a9643957ded36334946280f3a8f72201f94f4753c31c0c41449b1b9e9c48925196137f7cab0a4cfc56ac63701489c7626246ea1b3912070", 0xb8, 0x10001}, {&(0x7f0000002180)="4a616c0efab00a21645b7d9e4fd416181ed260b140e55d615ea4a40fd0427e79d519994cd3b4d6a5813746d1caf8cce57a5d3c1eb0b42617116d2fe30f27d06534438e7e4764d851b4eaa926ce54272060aa36af27bf5b37ac7ee1e18b6d68ceb02b2894f00cd7085d000abff4ad01c9628dc4005d725ae92764088ad936d92c226cbbea906e782c47a83f918866080a3bf2234aaae403b57005d44ab04e2d817bb8c104824f935a5ebee0f18c699458cb98b05598", 0xb5, 0x1}, {&(0x7f0000002240)="41a977bdf4d7", 0x6, 0x100000001}, {&(0x7f0000002280)="d392361ce7cd6db4480e8808af42b30d7ee818021f2787d498a5610e67bc6fcb4978402d8ab792eedb5826bef0564ac7bc683329a7f8a74810e5e1e197fcc2d256b724082b169910d0f6768ffa9ada00aab08a355f022ea09b6cf2d3b192cd5308f21e7a9b5165c42913ac699bf13abf588cee579454", 0x76, 0x27c5}, {&(0x7f0000002300)="ae8d8866", 0x4, 0x9}, {&(0x7f0000002340)="e8d4ced7f8166169ae6fea9ff7025720bd3ab414b3b0e62072f292a7e1f92a05ff4fa82844ff8b36e0302f04d03b150c6f99cd1e3608f3c07966254a08f547917b1b7a34048840e9d60dc47fda18ca276c92459928d3e714cfdcadad716bfde59f49920311914b2ea19a36c05f672ecbfad85e1b3eb1ec1d72555ea3fa452d8c9dd979b60a0db7a9787ecd55d6c5b7558b4e0382d402400854c8e4da4faafb67c589f410d9125b079c0e9dc2a4f249e045e06fe759f3b74598cd9ec00e2147b7af87f5b2ec2dd19e9e6fab16fe072abfd522aa158f1dd1a9c954776ad25b30061d624bb618911737dbd3482f74cde272d462283b07f403147c", 0xf9, 0x2}, {0x0, 0x0, 0x62}], 0x200000, &(0x7f00000026c0)={[{@utf8no}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'macturkish'}}], [{@fsuuid={'fsuuid', 0x3d, {[0x31, 0x36, 0x32, 0x63, 0x30, 0x0, 0x55, 0x35], 0x2d, [0x36, 0x61, 0x61, 0x35], 0x2d, [0x37, 0x64, 0x32], 0x2d, [0xb, 0x60, 0x5, 0x35], 0x2d, [0x61, 0x5, 0x0, 0x32, 0x39, 0x37, 0x61, 0x34]}}}, {@uid_eq}, {@dont_hash}]}) fspick(r0, &(0x7f0000002740)='./file0\x00', 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000004200)) [ 121.129860] loop4: detected capacity change from 0 to 264192 [ 121.132378] FAT-fs (loop4): Unrecognized mount option "fsuuid=162c0" or missing value 02:44:11 executing program 4: mount$9p_rdma(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0)) syz_mount_image$tmpfs(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000001880)) chown(&(0x7f0000001900)='./file0\x00', 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000001c00)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = syz_mount_image$vfat(&(0x7f0000002040), &(0x7f0000002080)='./file0\x00', 0x0, 0x7, &(0x7f00000025c0)=[{&(0x7f00000020c0)="82cd02898db7ce1f4268ddd494538936c6a25a32f5af667a950cef344530a0bfc40d426b28af12968fa03752ee67abaa74fb9769cb3cb9b1588cb0b5c5933a24725b9600e8217da8cc829fc0cec78358f051a8bc527a115506b62137a00ec9e2c66e83e52fb617f0ba87ef199d92364e126e26a619c51161d5cdeff8f01ad7197a9643957ded36334946280f3a8f72201f94f4753c31c0c41449b1b9e9c48925196137f7cab0a4cfc56ac63701489c7626246ea1b3912070", 0xb8, 0x10001}, {&(0x7f0000002180)="4a616c0efab00a21645b7d9e4fd416181ed260b140e55d615ea4a40fd0427e79d519994cd3b4d6a5813746d1caf8cce57a5d3c1eb0b42617116d2fe30f27d06534438e7e4764d851b4eaa926ce54272060aa36af27bf5b37ac7ee1e18b6d68ceb02b2894f00cd7085d000abff4ad01c9628dc4005d725ae92764088ad936d92c226cbbea906e782c47a83f918866080a3bf2234aaae403b57005d44ab04e2d817bb8c104824f935a5ebee0f18c699458cb98b05598", 0xb5, 0x1}, {&(0x7f0000002240)="41a977bdf4d7", 0x6, 0x100000001}, {&(0x7f0000002280)="d392361ce7cd6db4480e8808af42b30d7ee818021f2787d498a5610e67bc6fcb4978402d8ab792eedb5826bef0564ac7bc683329a7f8a74810e5e1e197fcc2d256b724082b169910d0f6768ffa9ada00aab08a355f022ea09b6cf2d3b192cd5308f21e7a9b5165c42913ac699bf13abf588cee579454", 0x76, 0x27c5}, {&(0x7f0000002300)="ae8d8866", 0x4, 0x9}, {&(0x7f0000002340)="e8d4ced7f8166169ae6fea9ff7025720bd3ab414b3b0e62072f292a7e1f92a05ff4fa82844ff8b36e0302f04d03b150c6f99cd1e3608f3c07966254a08f547917b1b7a34048840e9d60dc47fda18ca276c92459928d3e714cfdcadad716bfde59f49920311914b2ea19a36c05f672ecbfad85e1b3eb1ec1d72555ea3fa452d8c9dd979b60a0db7a9787ecd55d6c5b7558b4e0382d402400854c8e4da4faafb67c589f410d9125b079c0e9dc2a4f249e045e06fe759f3b74598cd9ec00e2147b7af87f5b2ec2dd19e9e6fab16fe072abfd522aa158f1dd1a9c954776ad25b30061d624bb618911737dbd3482f74cde272d462283b07f403147c", 0xf9, 0x2}, {0x0, 0x0, 0x62}], 0x200000, &(0x7f00000026c0)={[{@utf8no}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'macturkish'}}], [{@fsuuid={'fsuuid', 0x3d, {[0x31, 0x36, 0x32, 0x63, 0x30, 0x0, 0x55, 0x35], 0x2d, [0x36, 0x61, 0x61, 0x35], 0x2d, [0x37, 0x64, 0x32], 0x2d, [0xb, 0x60, 0x5, 0x35], 0x2d, [0x61, 0x5, 0x0, 0x32, 0x39, 0x37, 0x61, 0x34]}}}, {@uid_eq}, {@dont_hash}]}) fspick(r0, &(0x7f0000002740)='./file0\x00', 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000004200)) [ 121.379657] loop4: detected capacity change from 0 to 264192 [ 121.380867] FAT-fs (loop4): Unrecognized mount option "fsuuid=162c0" or missing value 02:44:11 executing program 4: mount$9p_rdma(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0)) syz_mount_image$tmpfs(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000001880)) chown(&(0x7f0000001900)='./file0\x00', 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000001c00)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = syz_mount_image$vfat(&(0x7f0000002040), &(0x7f0000002080)='./file0\x00', 0x0, 0x7, &(0x7f00000025c0)=[{&(0x7f00000020c0)="82cd02898db7ce1f4268ddd494538936c6a25a32f5af667a950cef344530a0bfc40d426b28af12968fa03752ee67abaa74fb9769cb3cb9b1588cb0b5c5933a24725b9600e8217da8cc829fc0cec78358f051a8bc527a115506b62137a00ec9e2c66e83e52fb617f0ba87ef199d92364e126e26a619c51161d5cdeff8f01ad7197a9643957ded36334946280f3a8f72201f94f4753c31c0c41449b1b9e9c48925196137f7cab0a4cfc56ac63701489c7626246ea1b3912070", 0xb8, 0x10001}, {&(0x7f0000002180)="4a616c0efab00a21645b7d9e4fd416181ed260b140e55d615ea4a40fd0427e79d519994cd3b4d6a5813746d1caf8cce57a5d3c1eb0b42617116d2fe30f27d06534438e7e4764d851b4eaa926ce54272060aa36af27bf5b37ac7ee1e18b6d68ceb02b2894f00cd7085d000abff4ad01c9628dc4005d725ae92764088ad936d92c226cbbea906e782c47a83f918866080a3bf2234aaae403b57005d44ab04e2d817bb8c104824f935a5ebee0f18c699458cb98b05598", 0xb5, 0x1}, {&(0x7f0000002240)="41a977bdf4d7", 0x6, 0x100000001}, {&(0x7f0000002280)="d392361ce7cd6db4480e8808af42b30d7ee818021f2787d498a5610e67bc6fcb4978402d8ab792eedb5826bef0564ac7bc683329a7f8a74810e5e1e197fcc2d256b724082b169910d0f6768ffa9ada00aab08a355f022ea09b6cf2d3b192cd5308f21e7a9b5165c42913ac699bf13abf588cee579454", 0x76, 0x27c5}, {&(0x7f0000002300)="ae8d8866", 0x4, 0x9}, {&(0x7f0000002340)="e8d4ced7f8166169ae6fea9ff7025720bd3ab414b3b0e62072f292a7e1f92a05ff4fa82844ff8b36e0302f04d03b150c6f99cd1e3608f3c07966254a08f547917b1b7a34048840e9d60dc47fda18ca276c92459928d3e714cfdcadad716bfde59f49920311914b2ea19a36c05f672ecbfad85e1b3eb1ec1d72555ea3fa452d8c9dd979b60a0db7a9787ecd55d6c5b7558b4e0382d402400854c8e4da4faafb67c589f410d9125b079c0e9dc2a4f249e045e06fe759f3b74598cd9ec00e2147b7af87f5b2ec2dd19e9e6fab16fe072abfd522aa158f1dd1a9c954776ad25b30061d624bb618911737dbd3482f74cde272d462283b07f403147c", 0xf9, 0x2}, {0x0, 0x0, 0x62}], 0x200000, &(0x7f00000026c0)={[{@utf8no}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'macturkish'}}], [{@fsuuid={'fsuuid', 0x3d, {[0x31, 0x36, 0x32, 0x63, 0x30, 0x0, 0x55, 0x35], 0x2d, [0x36, 0x61, 0x61, 0x35], 0x2d, [0x37, 0x64, 0x32], 0x2d, [0xb, 0x60, 0x5, 0x35], 0x2d, [0x61, 0x5, 0x0, 0x32, 0x39, 0x37, 0x61, 0x34]}}}, {@uid_eq}, {@dont_hash}]}) fspick(r0, &(0x7f0000002740)='./file0\x00', 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000004200)) [ 121.647535] loop4: detected capacity change from 0 to 264192 [ 121.653090] FAT-fs (loop4): Unrecognized mount option "fsuuid=162c0" or missing value [ 124.757084] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 124.761317] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 124.762950] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 124.770502] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 124.775630] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 124.777852] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 124.782594] Bluetooth: hci2: HCI_REQ-0x0c1a [ 124.831745] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 124.834119] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 124.837298] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 124.840384] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 124.842445] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 124.843953] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 124.849549] Bluetooth: hci3: HCI_REQ-0x0c1a [ 124.869027] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 124.871645] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 124.874724] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 124.921303] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 124.925092] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 124.925760] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 124.927401] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 124.931264] Bluetooth: hci5: HCI_REQ-0x0c1a [ 124.944675] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 124.947423] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 124.953759] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 124.959419] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 124.960815] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 124.968320] Bluetooth: hci6: HCI_REQ-0x0c1a [ 126.777529] Bluetooth: hci1: Opcode 0x c03 failed: -110 [ 126.778919] Bluetooth: hci0: Opcode 0x c03 failed: -110 [ 126.842555] Bluetooth: hci2: command 0x0409 tx timeout [ 126.905601] Bluetooth: hci7: Opcode 0x c03 failed: -110 [ 126.906554] Bluetooth: hci3: command 0x0409 tx timeout [ 126.969548] Bluetooth: hci5: command 0x0409 tx timeout [ 127.033580] Bluetooth: hci6: command 0x0409 tx timeout [ 128.889512] Bluetooth: hci2: command 0x041b tx timeout [ 128.953510] Bluetooth: hci3: command 0x041b tx timeout [ 129.017526] Bluetooth: hci5: command 0x041b tx timeout [ 129.054223] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 129.060724] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 129.064704] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 129.067804] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 129.069029] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 129.069843] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 129.073597] Bluetooth: hci0: HCI_REQ-0x0c1a [ 129.081509] Bluetooth: hci6: command 0x041b tx timeout [ 130.937519] Bluetooth: hci2: command 0x040f tx timeout [ 131.001553] Bluetooth: hci3: command 0x040f tx timeout [ 131.065772] Bluetooth: hci5: command 0x040f tx timeout [ 131.129553] Bluetooth: hci6: command 0x040f tx timeout [ 131.129628] Bluetooth: hci0: command 0x0409 tx timeout [ 131.321582] Bluetooth: hci1: Opcode 0x c03 failed: -110 [ 131.449524] Bluetooth: hci7: Opcode 0x c03 failed: -110 [ 132.985507] Bluetooth: hci2: command 0x0419 tx timeout [ 133.049536] Bluetooth: hci3: command 0x0419 tx timeout [ 133.113528] Bluetooth: hci5: command 0x0419 tx timeout [ 133.177745] Bluetooth: hci6: command 0x0419 tx timeout [ 133.178193] Bluetooth: hci0: command 0x041b tx timeout [ 133.793366] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 133.795717] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 133.797748] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 133.804701] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 133.807662] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 133.808701] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 133.814734] Bluetooth: hci1: HCI_REQ-0x0c1a [ 133.904289] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 133.906631] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 133.907256] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 133.909356] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 133.910351] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 133.911993] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 133.933834] Bluetooth: hci7: HCI_REQ-0x0c1a [ 135.225638] Bluetooth: hci0: command 0x040f tx timeout [ 135.865532] Bluetooth: hci1: command 0x0409 tx timeout [ 135.993532] Bluetooth: hci7: command 0x0409 tx timeout [ 137.273653] Bluetooth: hci0: command 0x0419 tx timeout [ 137.913552] Bluetooth: hci1: command 0x041b tx timeout [ 138.041557] Bluetooth: hci7: command 0x041b tx timeout [ 139.961515] Bluetooth: hci1: command 0x040f tx timeout [ 140.089523] Bluetooth: hci7: command 0x040f tx timeout [ 142.009520] Bluetooth: hci1: command 0x0419 tx timeout [ 142.137569] Bluetooth: hci7: command 0x0419 tx timeout [ 168.454491] audit: type=1400 audit(1664419498.686:7): avc: denied { open } for pid=6557 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 168.455925] audit: type=1400 audit(1664419498.686:8): avc: denied { kernel } for pid=6557 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 168.474128] ------------[ cut here ]------------ [ 168.474147] [ 168.474150] ====================================================== [ 168.474154] WARNING: possible circular locking dependency detected [ 168.474158] 6.0.0-rc7-next-20220928 #1 Not tainted [ 168.474164] ------------------------------------------------------ [ 168.474167] syz-executor.1/6558 is trying to acquire lock: [ 168.474174] ffffffff853faab8 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 168.474217] [ 168.474217] but task is already holding lock: [ 168.474220] ffff888009791820 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 168.474250] [ 168.474250] which lock already depends on the new lock. [ 168.474250] [ 168.474253] [ 168.474253] the existing dependency chain (in reverse order) is: [ 168.474256] [ 168.474256] -> #3 (&ctx->lock){....}-{2:2}: [ 168.474271] _raw_spin_lock+0x2a/0x40 [ 168.474284] __perf_event_task_sched_out+0x53b/0x18d0 [ 168.474297] __schedule+0xedd/0x2470 [ 168.474315] schedule+0xda/0x1b0 [ 168.474332] exit_to_user_mode_prepare+0x114/0x1a0 [ 168.474345] syscall_exit_to_user_mode+0x19/0x40 [ 168.474360] do_syscall_64+0x48/0x90 [ 168.474370] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 168.474386] [ 168.474386] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 168.474400] _raw_spin_lock_nested+0x30/0x40 [ 168.474413] raw_spin_rq_lock_nested+0x1e/0x30 [ 168.474426] task_fork_fair+0x63/0x4d0 [ 168.474445] sched_cgroup_fork+0x3d0/0x540 [ 168.474463] copy_process+0x4183/0x6e20 [ 168.474474] kernel_clone+0xe7/0x890 [ 168.474484] user_mode_thread+0xad/0xf0 [ 168.474495] rest_init+0x24/0x250 [ 168.474509] arch_call_rest_init+0xf/0x14 [ 168.474530] start_kernel+0x4c6/0x4eb [ 168.474548] secondary_startup_64_no_verify+0xe0/0xeb [ 168.474564] [ 168.474564] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 168.474578] _raw_spin_lock_irqsave+0x39/0x60 [ 168.474591] try_to_wake_up+0xab/0x1930 [ 168.474606] up+0x75/0xb0 [ 168.474623] __up_console_sem+0x6e/0x80 [ 168.474641] console_unlock+0x46a/0x590 [ 168.474658] vprintk_emit+0x1bd/0x560 [ 168.474676] vprintk+0x84/0xa0 [ 168.474694] _printk+0xba/0xf1 [ 168.474708] kauditd_hold_skb.cold+0x3f/0x4e [ 168.474728] kauditd_send_queue+0x233/0x290 [ 168.474745] kauditd_thread+0x5da/0x9a0 [ 168.474760] kthread+0x2ed/0x3a0 [ 168.474791] ret_from_fork+0x22/0x30 [ 168.474804] [ 168.474804] -> #0 ((console_sem).lock){....}-{2:2}: [ 168.474819] __lock_acquire+0x2a02/0x5e70 [ 168.474838] lock_acquire+0x1a2/0x530 [ 168.474856] _raw_spin_lock_irqsave+0x39/0x60 [ 168.474869] down_trylock+0xe/0x70 [ 168.474887] __down_trylock_console_sem+0x3b/0xd0 [ 168.474905] vprintk_emit+0x16b/0x560 [ 168.474923] vprintk+0x84/0xa0 [ 168.474941] _printk+0xba/0xf1 [ 168.474954] report_bug.cold+0x72/0xab [ 168.474964] handle_bug+0x3c/0x70 [ 168.474974] exc_invalid_op+0x14/0x50 [ 168.474985] asm_exc_invalid_op+0x16/0x20 [ 168.475000] group_sched_out.part.0+0x2c7/0x460 [ 168.475011] ctx_sched_out+0x8f1/0xc10 [ 168.475022] __perf_event_task_sched_out+0x6d0/0x18d0 [ 168.475035] __schedule+0xedd/0x2470 [ 168.475052] schedule+0xda/0x1b0 [ 168.475069] exit_to_user_mode_prepare+0x114/0x1a0 [ 168.475080] syscall_exit_to_user_mode+0x19/0x40 [ 168.475096] do_syscall_64+0x48/0x90 [ 168.475106] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 168.475121] [ 168.475121] other info that might help us debug this: [ 168.475121] [ 168.475124] Chain exists of: [ 168.475124] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 168.475124] [ 168.475140] Possible unsafe locking scenario: [ 168.475140] [ 168.475142] CPU0 CPU1 [ 168.475145] ---- ---- [ 168.475147] lock(&ctx->lock); [ 168.475153] lock(&rq->__lock); [ 168.475159] lock(&ctx->lock); [ 168.475166] lock((console_sem).lock); [ 168.475172] [ 168.475172] *** DEADLOCK *** [ 168.475172] [ 168.475174] 2 locks held by syz-executor.1/6558: [ 168.475181] #0: ffff88806ce37d18 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 168.475214] #1: ffff888009791820 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 168.475244] [ 168.475244] stack backtrace: [ 168.475247] CPU: 0 PID: 6558 Comm: syz-executor.1 Not tainted 6.0.0-rc7-next-20220928 #1 [ 168.475260] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 168.475268] Call Trace: [ 168.475272] [ 168.475276] dump_stack_lvl+0x8b/0xb3 [ 168.475288] check_noncircular+0x263/0x2e0 [ 168.475307] ? format_decode+0x26c/0xb50 [ 168.475326] ? print_circular_bug+0x450/0x450 [ 168.475345] ? enable_ptr_key_workfn+0x20/0x20 [ 168.475365] ? format_decode+0x26c/0xb50 [ 168.475386] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 168.475405] __lock_acquire+0x2a02/0x5e70 [ 168.475429] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 168.475454] lock_acquire+0x1a2/0x530 [ 168.475472] ? down_trylock+0xe/0x70 [ 168.475493] ? lock_release+0x750/0x750 [ 168.475516] ? vprintk+0x84/0xa0 [ 168.475536] _raw_spin_lock_irqsave+0x39/0x60 [ 168.475550] ? down_trylock+0xe/0x70 [ 168.475570] down_trylock+0xe/0x70 [ 168.475589] ? vprintk+0x84/0xa0 [ 168.475608] __down_trylock_console_sem+0x3b/0xd0 [ 168.475627] vprintk_emit+0x16b/0x560 [ 168.475648] vprintk+0x84/0xa0 [ 168.475668] _printk+0xba/0xf1 [ 168.475682] ? record_print_text.cold+0x16/0x16 [ 168.475701] ? report_bug.cold+0x66/0xab [ 168.475713] ? group_sched_out.part.0+0x2c7/0x460 [ 168.475725] report_bug.cold+0x72/0xab [ 168.475738] handle_bug+0x3c/0x70 [ 168.475750] exc_invalid_op+0x14/0x50 [ 168.475762] asm_exc_invalid_op+0x16/0x20 [ 168.475778] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 168.475792] Code: 5e 41 5f e9 cb a9 ef ff e8 c6 a9 ef ff 65 8b 1d db 12 ac 7e 31 ff 89 de e8 66 a6 ef ff 85 db 0f 84 8a 00 00 00 e8 a9 a9 ef ff <0f> 0b e9 a5 fe ff ff e8 9d a9 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 168.475804] RSP: 0018:ffff888031597c48 EFLAGS: 00010006 [ 168.475814] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 168.475821] RDX: ffff88800ffd1ac0 RSI: ffffffff815662f7 RDI: 0000000000000005 [ 168.475830] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 168.475837] R10: 0000000000000000 R11: ffffffff865b401b R12: ffff888009791800 [ 168.475845] R13: ffff88806ce3d140 R14: ffffffff8547cf00 R15: 0000000000000002 [ 168.475857] ? group_sched_out.part.0+0x2c7/0x460 [ 168.475875] ? group_sched_out.part.0+0x2c7/0x460 [ 168.475893] ctx_sched_out+0x8f1/0xc10 [ 168.475909] __perf_event_task_sched_out+0x6d0/0x18d0 [ 168.475925] ? lock_is_held_type+0xd7/0x130 [ 168.475942] ? __perf_cgroup_move+0x160/0x160 [ 168.475955] ? set_next_entity+0x304/0x550 [ 168.475975] ? update_curr+0x267/0x740 [ 168.475995] ? lock_is_held_type+0xd7/0x130 [ 168.476012] __schedule+0xedd/0x2470 [ 168.476033] ? io_schedule_timeout+0x150/0x150 [ 168.476053] ? rcu_read_lock_sched_held+0x3e/0x80 [ 168.476075] schedule+0xda/0x1b0 [ 168.476093] exit_to_user_mode_prepare+0x114/0x1a0 [ 168.476106] syscall_exit_to_user_mode+0x19/0x40 [ 168.476123] do_syscall_64+0x48/0x90 [ 168.476134] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 168.476150] RIP: 0033:0x7f20da55cb19 [ 168.476159] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 168.476170] RSP: 002b:00007f20d7ad2218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 168.476182] RAX: 0000000000000001 RBX: 00007f20da66ff68 RCX: 00007f20da55cb19 [ 168.476189] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f20da66ff6c [ 168.476197] RBP: 00007f20da66ff60 R08: 000000000000000e R09: 0000000000000000 [ 168.476204] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f20da66ff6c [ 168.476212] R13: 00007fff3bb54d3f R14: 00007f20d7ad2300 R15: 0000000000022000 [ 168.476226] [ 168.531497] WARNING: CPU: 0 PID: 6558 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 168.532270] Modules linked in: [ 168.532520] CPU: 0 PID: 6558 Comm: syz-executor.1 Not tainted 6.0.0-rc7-next-20220928 #1 [ 168.533126] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 168.533959] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 168.534408] Code: 5e 41 5f e9 cb a9 ef ff e8 c6 a9 ef ff 65 8b 1d db 12 ac 7e 31 ff 89 de e8 66 a6 ef ff 85 db 0f 84 8a 00 00 00 e8 a9 a9 ef ff <0f> 0b e9 a5 fe ff ff e8 9d a9 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 168.535600] RSP: 0018:ffff888031597c48 EFLAGS: 00010006 [ 168.535955] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 168.536424] RDX: ffff88800ffd1ac0 RSI: ffffffff815662f7 RDI: 0000000000000005 [ 168.536896] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 168.537371] R10: 0000000000000000 R11: ffffffff865b401b R12: ffff888009791800 [ 168.537844] R13: ffff88806ce3d140 R14: ffffffff8547cf00 R15: 0000000000000002 [ 168.538319] FS: 00007f20d7ad2700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 168.538860] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 168.539245] CR2: 00007f0a466ba260 CR3: 000000002c6b0000 CR4: 0000000000350ef0 [ 168.539720] Call Trace: [ 168.539894] [ 168.540051] ctx_sched_out+0x8f1/0xc10 [ 168.540315] __perf_event_task_sched_out+0x6d0/0x18d0 [ 168.540671] ? lock_is_held_type+0xd7/0x130 [ 168.540967] ? __perf_cgroup_move+0x160/0x160 [ 168.541271] ? set_next_entity+0x304/0x550 [ 168.541563] ? update_curr+0x267/0x740 [ 168.541833] ? lock_is_held_type+0xd7/0x130 [ 168.542128] __schedule+0xedd/0x2470 [ 168.542389] ? io_schedule_timeout+0x150/0x150 [ 168.542708] ? rcu_read_lock_sched_held+0x3e/0x80 [ 168.543047] schedule+0xda/0x1b0 [ 168.543285] exit_to_user_mode_prepare+0x114/0x1a0 [ 168.543615] syscall_exit_to_user_mode+0x19/0x40 [ 168.543935] do_syscall_64+0x48/0x90 [ 168.544187] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 168.544534] RIP: 0033:0x7f20da55cb19 [ 168.544785] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 168.545956] RSP: 002b:00007f20d7ad2218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 168.546457] RAX: 0000000000000001 RBX: 00007f20da66ff68 RCX: 00007f20da55cb19 [ 168.546944] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f20da66ff6c [ 168.547422] RBP: 00007f20da66ff60 R08: 000000000000000e R09: 0000000000000000 [ 168.547884] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f20da66ff6c [ 168.548353] R13: 00007fff3bb54d3f R14: 00007f20d7ad2300 R15: 0000000000022000 [ 168.548825] [ 168.548987] irq event stamp: 794 [ 168.549215] hardirqs last enabled at (793): [] exit_to_user_mode_prepare+0x109/0x1a0 [ 168.549826] hardirqs last disabled at (794): [] __schedule+0x1225/0x2470 [ 168.550374] softirqs last enabled at (520): [] __irq_exit_rcu+0x11b/0x180 [ 168.550946] softirqs last disabled at (339): [] __irq_exit_rcu+0x11b/0x180 [ 168.551508] ---[ end trace 0000000000000000 ]--- [ 168.681338] blktrace: Concurrent blktraces are not allowed on sg0 [ 168.876251] loop1: detected capacity change from 0 to 264192 [ 168.908803] FAT-fs (loop1): Unrecognized mount option "000000000000077672551311844674407370955161500000000000000000000004" or missing value [ 168.945478] hrtimer: interrupt took 18555 ns [ 169.102762] loop1: detected capacity change from 0 to 264192 [ 169.103619] FAT-fs (loop1): Unrecognized mount option "000000000000057761527551844674407370955161500000000000000000000004" or missing value [ 170.299438] syz-executor.2 uses obsolete (PF_INET,SOCK_PACKET) [ 170.304154] device syz_tun entered promiscuous mode [ 170.343994] device syz_tun left promiscuous mode [ 170.355839] device syz_tun entered promiscuous mode [ 170.383691] device syz_tun left promiscuous mode [ 173.184890] FAT-fs (loop0): Unrecognized mount option "01777777777777777777777" or missing value [ 173.225593] FAT-fs (loop0): Unrecognized mount option "01777777777777777777777" or missing value 02:45:03 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='.\x00', 0x0, 0x0, &(0x7f0000001300), 0x800010, &(0x7f0000000380)=ANY=[@ANYRESOCT, @ANYRES32=r1, @ANYRESDEC=r0, @ANYRES16, @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)=0x4000) getpeername$unix(r2, &(0x7f0000000300)=@abs, &(0x7f0000000200)=0x6e) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) 02:45:03 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) 02:45:03 executing program 4: mount$9p_rdma(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0)) syz_mount_image$tmpfs(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000001880)) chown(&(0x7f0000001900)='./file0\x00', 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000001c00)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = syz_mount_image$vfat(&(0x7f0000002040), &(0x7f0000002080)='./file0\x00', 0x0, 0x7, &(0x7f00000025c0)=[{&(0x7f00000020c0)="82cd02898db7ce1f4268ddd494538936c6a25a32f5af667a950cef344530a0bfc40d426b28af12968fa03752ee67abaa74fb9769cb3cb9b1588cb0b5c5933a24725b9600e8217da8cc829fc0cec78358f051a8bc527a115506b62137a00ec9e2c66e83e52fb617f0ba87ef199d92364e126e26a619c51161d5cdeff8f01ad7197a9643957ded36334946280f3a8f72201f94f4753c31c0c41449b1b9e9c48925196137f7cab0a4cfc56ac63701489c7626246ea1b3912070", 0xb8, 0x10001}, {&(0x7f0000002180)="4a616c0efab00a21645b7d9e4fd416181ed260b140e55d615ea4a40fd0427e79d519994cd3b4d6a5813746d1caf8cce57a5d3c1eb0b42617116d2fe30f27d06534438e7e4764d851b4eaa926ce54272060aa36af27bf5b37ac7ee1e18b6d68ceb02b2894f00cd7085d000abff4ad01c9628dc4005d725ae92764088ad936d92c226cbbea906e782c47a83f918866080a3bf2234aaae403b57005d44ab04e2d817bb8c104824f935a5ebee0f18c699458cb98b05598", 0xb5, 0x1}, {&(0x7f0000002240)="41a977bdf4d7", 0x6, 0x100000001}, {&(0x7f0000002280)="d392361ce7cd6db4480e8808af42b30d7ee818021f2787d498a5610e67bc6fcb4978402d8ab792eedb5826bef0564ac7bc683329a7f8a74810e5e1e197fcc2d256b724082b169910d0f6768ffa9ada00aab08a355f022ea09b6cf2d3b192cd5308f21e7a9b5165c42913ac699bf13abf588cee579454", 0x76, 0x27c5}, {&(0x7f0000002300)="ae8d8866", 0x4, 0x9}, {&(0x7f0000002340)="e8d4ced7f8166169ae6fea9ff7025720bd3ab414b3b0e62072f292a7e1f92a05ff4fa82844ff8b36e0302f04d03b150c6f99cd1e3608f3c07966254a08f547917b1b7a34048840e9d60dc47fda18ca276c92459928d3e714cfdcadad716bfde59f49920311914b2ea19a36c05f672ecbfad85e1b3eb1ec1d72555ea3fa452d8c9dd979b60a0db7a9787ecd55d6c5b7558b4e0382d402400854c8e4da4faafb67c589f410d9125b079c0e9dc2a4f249e045e06fe759f3b74598cd9ec00e2147b7af87f5b2ec2dd19e9e6fab16fe072abfd522aa158f1dd1a9c954776ad25b30061d624bb618911737dbd3482f74cde272d462283b07f403147c", 0xf9, 0x2}, {0x0, 0x0, 0x62}], 0x200000, &(0x7f00000026c0)={[{@utf8no}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'macturkish'}}], [{@fsuuid={'fsuuid', 0x3d, {[0x31, 0x36, 0x32, 0x63, 0x30, 0x0, 0x55, 0x35], 0x2d, [0x36, 0x61, 0x61, 0x35], 0x2d, [0x37, 0x64, 0x32], 0x2d, [0xb, 0x60, 0x5, 0x35], 0x2d, [0x61, 0x5, 0x0, 0x32, 0x39, 0x37, 0x61, 0x34]}}}, {@uid_eq}, {@dont_hash}]}) fspick(r0, &(0x7f0000002740)='./file0\x00', 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000004200)) 02:45:03 executing program 2: socket$inet(0x2, 0xa, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) socketpair(0x11, 0x2, 0x3, &(0x7f0000000040)) 02:45:03 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000080)={r3, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r3, 0x3, 0x6, @link_local}, 0x10) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) close_range(r0, r0, 0x0) 02:45:03 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$SNAPSHOT_S2RAM(r0, 0x330b) 02:45:03 executing program 5: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) 02:45:03 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) sendmmsg$inet6(r0, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)='*', 0x1}], 0x1}}], 0x1, 0x4000001) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) [ 173.349998] device syz_tun entered promiscuous mode [ 173.366100] FAT-fs (loop0): Unrecognized mount option "01777777777777777777777" or missing value [ 173.372299] loop1: detected capacity change from 0 to 264192 [ 173.375192] loop4: detected capacity change from 0 to 264192 [ 173.377179] FAT-fs (loop4): Unrecognized mount option "fsuuid=162c0" or missing value [ 173.379191] FAT-fs (loop1): Unrecognized mount option "000000000000062451474641844674407370955161500000000000000000000004" or missing value 02:45:03 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$SNAPSHOT_S2RAM(r0, 0x330b) [ 173.389876] device syz_tun left promiscuous mode 02:45:03 executing program 2: socket$inet(0x2, 0xa, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) socketpair(0x11, 0x2, 0x3, &(0x7f0000000040)) 02:45:03 executing program 4: mount$9p_rdma(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0)) syz_mount_image$tmpfs(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000001880)) chown(&(0x7f0000001900)='./file0\x00', 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000001c00)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = syz_mount_image$vfat(&(0x7f0000002040), &(0x7f0000002080)='./file0\x00', 0x0, 0x7, &(0x7f00000025c0)=[{&(0x7f00000020c0)="82cd02898db7ce1f4268ddd494538936c6a25a32f5af667a950cef344530a0bfc40d426b28af12968fa03752ee67abaa74fb9769cb3cb9b1588cb0b5c5933a24725b9600e8217da8cc829fc0cec78358f051a8bc527a115506b62137a00ec9e2c66e83e52fb617f0ba87ef199d92364e126e26a619c51161d5cdeff8f01ad7197a9643957ded36334946280f3a8f72201f94f4753c31c0c41449b1b9e9c48925196137f7cab0a4cfc56ac63701489c7626246ea1b3912070", 0xb8, 0x10001}, {&(0x7f0000002180)="4a616c0efab00a21645b7d9e4fd416181ed260b140e55d615ea4a40fd0427e79d519994cd3b4d6a5813746d1caf8cce57a5d3c1eb0b42617116d2fe30f27d06534438e7e4764d851b4eaa926ce54272060aa36af27bf5b37ac7ee1e18b6d68ceb02b2894f00cd7085d000abff4ad01c9628dc4005d725ae92764088ad936d92c226cbbea906e782c47a83f918866080a3bf2234aaae403b57005d44ab04e2d817bb8c104824f935a5ebee0f18c699458cb98b05598", 0xb5, 0x1}, {&(0x7f0000002240)="41a977bdf4d7", 0x6, 0x100000001}, {&(0x7f0000002280)="d392361ce7cd6db4480e8808af42b30d7ee818021f2787d498a5610e67bc6fcb4978402d8ab792eedb5826bef0564ac7bc683329a7f8a74810e5e1e197fcc2d256b724082b169910d0f6768ffa9ada00aab08a355f022ea09b6cf2d3b192cd5308f21e7a9b5165c42913ac699bf13abf588cee579454", 0x76, 0x27c5}, {&(0x7f0000002300)="ae8d8866", 0x4, 0x9}, {&(0x7f0000002340)="e8d4ced7f8166169ae6fea9ff7025720bd3ab414b3b0e62072f292a7e1f92a05ff4fa82844ff8b36e0302f04d03b150c6f99cd1e3608f3c07966254a08f547917b1b7a34048840e9d60dc47fda18ca276c92459928d3e714cfdcadad716bfde59f49920311914b2ea19a36c05f672ecbfad85e1b3eb1ec1d72555ea3fa452d8c9dd979b60a0db7a9787ecd55d6c5b7558b4e0382d402400854c8e4da4faafb67c589f410d9125b079c0e9dc2a4f249e045e06fe759f3b74598cd9ec00e2147b7af87f5b2ec2dd19e9e6fab16fe072abfd522aa158f1dd1a9c954776ad25b30061d624bb618911737dbd3482f74cde272d462283b07f403147c", 0xf9, 0x2}, {0x0, 0x0, 0x62}], 0x200000, &(0x7f00000026c0)={[{@utf8no}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'macturkish'}}], [{@fsuuid={'fsuuid', 0x3d, {[0x31, 0x36, 0x32, 0x63, 0x30, 0x0, 0x55, 0x35], 0x2d, [0x36, 0x61, 0x61, 0x35], 0x2d, [0x37, 0x64, 0x32], 0x2d, [0xb, 0x60, 0x5, 0x35], 0x2d, [0x61, 0x5, 0x0, 0x32, 0x39, 0x37, 0x61, 0x34]}}}, {@uid_eq}, {@dont_hash}]}) fspick(r0, &(0x7f0000002740)='./file0\x00', 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000004200)) [ 173.436105] blktrace: Concurrent blktraces are not allowed on sg0 02:45:03 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) sendmmsg$inet6(r0, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)='*', 0x1}], 0x1}}], 0x1, 0x4000001) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) [ 173.523322] loop4: detected capacity change from 0 to 264192 [ 173.524107] FAT-fs (loop4): Unrecognized mount option "fsuuid=162c0" or missing value 02:45:03 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='.\x00', 0x0, 0x0, &(0x7f0000001300), 0x800010, &(0x7f0000000380)=ANY=[@ANYRESOCT, @ANYRES32=r1, @ANYRESDEC=r0, @ANYRES16, @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)=0x4000) getpeername$unix(r2, &(0x7f0000000300)=@abs, &(0x7f0000000200)=0x6e) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) 02:45:03 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$SNAPSHOT_S2RAM(r0, 0x330b) 02:45:03 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000080)={r3, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r3, 0x3, 0x6, @link_local}, 0x10) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) close_range(r0, r0, 0x0) 02:45:03 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) 02:45:03 executing program 5: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) 02:45:03 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) sendmmsg$inet6(r0, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)='*', 0x1}], 0x1}}], 0x1, 0x4000001) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) 02:45:03 executing program 2: socket$inet(0x2, 0xa, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) socketpair(0x11, 0x2, 0x3, &(0x7f0000000040)) 02:45:03 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='.\x00', 0x0, 0x0, &(0x7f0000001300), 0x800010, &(0x7f0000000380)=ANY=[@ANYRESOCT, @ANYRES32=r1, @ANYRESDEC=r0, @ANYRES16, @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)=0x4000) getpeername$unix(r2, &(0x7f0000000300)=@abs, &(0x7f0000000200)=0x6e) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) [ 173.639249] FAT-fs (loop0): Unrecognized mount option "01777777777777777777777" or missing value [ 173.652342] FAT-fs (loop4): Unrecognized mount option "01777777777777777777777" or missing value [ 173.669722] device syz_tun entered promiscuous mode [ 173.674523] loop1: detected capacity change from 0 to 264192 [ 173.705141] blktrace: Concurrent blktraces are not allowed on sg0 [ 173.790052] device syz_tun left promiscuous mode 02:45:04 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='.\x00', 0x0, 0x0, &(0x7f0000001300), 0x800010, &(0x7f0000000380)=ANY=[@ANYRESOCT, @ANYRES32=r1, @ANYRESDEC=r0, @ANYRES16, @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)=0x4000) getpeername$unix(r2, &(0x7f0000000300)=@abs, &(0x7f0000000200)=0x6e) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) 02:45:04 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='.\x00', 0x0, 0x0, &(0x7f0000001300), 0x800010, &(0x7f0000000380)=ANY=[@ANYRESOCT, @ANYRES32=r1, @ANYRESDEC=r0, @ANYRES16, @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)=0x4000) getpeername$unix(r2, &(0x7f0000000300)=@abs, &(0x7f0000000200)=0x6e) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) 02:45:04 executing program 7: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000080)={r3, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r3, 0x3, 0x6, @link_local}, 0x10) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) close_range(r0, r0, 0x0) 02:45:04 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000080)={r3, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r3, 0x3, 0x6, @link_local}, 0x10) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) close_range(r0, r0, 0x0) [ 174.002358] device syz_tun entered promiscuous mode [ 174.003510] device syz_tun entered promiscuous mode [ 174.084299] FAT-fs (loop6): Unrecognized mount option "01777777777777777777777" or missing value [ 174.085860] device syz_tun left promiscuous mode [ 174.268908] device syz_tun left promiscuous mode [ 174.316351] FAT-fs (loop1): Unrecognized mount option "000000000000054345227131844674407370955161500000000000000000000004" or missing value [ 174.366798] FAT-fs (loop0): Unrecognized mount option "01777777777777777777777" or missing value 02:45:04 executing program 5: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) 02:45:04 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000080)={r3, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r3, 0x3, 0x6, @link_local}, 0x10) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) close_range(r0, r0, 0x0) 02:45:04 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000080)={r3, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r3, 0x3, 0x6, @link_local}, 0x10) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) close_range(r0, r0, 0x0) 02:45:04 executing program 7: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000080)={r3, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r3, 0x3, 0x6, @link_local}, 0x10) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) close_range(r0, r0, 0x0) 02:45:04 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='.\x00', 0x0, 0x0, &(0x7f0000001300), 0x800010, &(0x7f0000000380)=ANY=[@ANYRESOCT, @ANYRES32=r1, @ANYRESDEC=r0, @ANYRES16, @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)=0x4000) getpeername$unix(r2, &(0x7f0000000300)=@abs, &(0x7f0000000200)=0x6e) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) 02:45:04 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) 02:45:04 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='.\x00', 0x0, 0x0, &(0x7f0000001300), 0x800010, &(0x7f0000000380)=ANY=[@ANYRESOCT, @ANYRES32=r1, @ANYRESDEC=r0, @ANYRES16, @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)=0x4000) getpeername$unix(r2, &(0x7f0000000300)=@abs, &(0x7f0000000200)=0x6e) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) 02:45:04 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) [ 174.505954] device syz_tun entered promiscuous mode [ 174.521975] device syz_tun entered promiscuous mode [ 174.554133] FAT-fs (loop4): Unrecognized mount option "01777777777777777777777" or missing value [ 174.575277] device syz_tun entered promiscuous mode [ 174.609274] device syz_tun left promiscuous mode [ 174.611743] loop1: detected capacity change from 0 to 264192 [ 174.628569] FAT-fs (loop6): Unrecognized mount option "01777777777777777777777" or missing value [ 174.630329] device syz_tun left promiscuous mode [ 174.638511] blktrace: Concurrent blktraces are not allowed on sg0 02:45:04 executing program 7: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000080)={r3, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r3, 0x3, 0x6, @link_local}, 0x10) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) close_range(r0, r0, 0x0) [ 174.688652] FAT-fs (loop1): Unrecognized mount option "000000000000053643301551844674407370955161500000000000000000000004" or missing value [ 174.715918] device syz_tun left promiscuous mode 02:45:04 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='.\x00', 0x0, 0x0, &(0x7f0000001300), 0x800010, &(0x7f0000000380)=ANY=[@ANYRESOCT, @ANYRES32=r1, @ANYRESDEC=r0, @ANYRES16, @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)=0x4000) getpeername$unix(r2, &(0x7f0000000300)=@abs, &(0x7f0000000200)=0x6e) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) [ 174.819299] device syz_tun entered promiscuous mode [ 174.864663] device syz_tun left promiscuous mode [ 174.910429] device syz_tun entered promiscuous mode 02:45:05 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='.\x00', 0x0, 0x0, &(0x7f0000001300), 0x800010, &(0x7f0000000380)=ANY=[@ANYRESOCT, @ANYRES32=r1, @ANYRESDEC=r0, @ANYRES16, @ANYRESHEX=r1]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)=0x4000) getpeername$unix(r2, &(0x7f0000000300)=@abs, &(0x7f0000000200)=0x6e) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) 02:45:05 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000080)={r3, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r3, 0x3, 0x6, @link_local}, 0x10) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) close_range(r0, r0, 0x0) [ 174.941948] loop0: detected capacity change from 0 to 264192 [ 174.944067] FAT-fs (loop0): Unrecognized mount option "000000000000033321666161844674407370955161500000000000000000000004" or missing value [ 174.945228] device syz_tun left promiscuous mode [ 174.965502] FAT-fs (loop4): Unrecognized mount option "01777777777777777777777" or missing value [ 175.238044] FAT-fs (loop6): Unrecognized mount option "01777777777777777777777" or missing value 02:45:05 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) 02:45:05 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) 02:45:05 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) 02:45:05 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) 02:45:05 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) 02:45:05 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) [ 175.549561] loop0: detected capacity change from 0 to 264192 [ 175.552169] FAT-fs (loop0): Unrecognized mount option "017777777777777777777771844674407370955161500000000000000000000004" or missing value [ 175.584398] loop1: detected capacity change from 0 to 264192 [ 175.626817] FAT-fs (loop1): Unrecognized mount option "000000000000070737773201844674407370955161500000000000000000000004" or missing value [ 175.637099] loop2: detected capacity change from 0 to 264192 [ 175.660735] loop3: detected capacity change from 0 to 264192 [ 175.679749] FAT-fs (loop2): Unrecognized mount option "000000000000075116316221844674407370955161500000000000000000000004" or missing value 02:45:05 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) 02:45:05 executing program 6: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) [ 175.704796] FAT-fs (loop3): Unrecognized mount option "000000000000000522176411844674407370955161500000000000000000000004" or missing value 02:45:05 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) [ 175.748836] loop4: detected capacity change from 0 to 264192 [ 175.773707] loop5: detected capacity change from 0 to 264192 02:45:06 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) [ 175.806477] loop0: detected capacity change from 0 to 264192 [ 175.820759] loop1: detected capacity change from 0 to 264192 02:45:06 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) [ 175.843955] blktrace: Concurrent blktraces are not allowed on sg0 [ 175.867997] FAT-fs (loop4): Unrecognized mount option "000000000000014770273451844674407370955161500000000000000000000004" or missing value 02:45:06 executing program 7: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) [ 175.918230] FAT-fs (loop0): Unrecognized mount option "000000000000070021212271844674407370955161500000000000000000000004" or missing value [ 175.922853] FAT-fs (loop1): Unrecognized mount option "000000000000071057714341844674407370955161500000000000000000000004" or missing value 02:45:06 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) [ 176.057450] FAT-fs (loop5): Unrecognized mount option "000000000000027065043601844674407370955161500000000000000000000004" or missing value [ 176.069816] blktrace: Concurrent blktraces are not allowed on sg0 [ 176.116426] loop2: detected capacity change from 0 to 264192 [ 176.175371] loop3: detected capacity change from 0 to 264192 02:45:06 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) 02:45:06 executing program 0: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) [ 176.221587] FAT-fs (loop2): Unrecognized mount option "000000000000070560416521844674407370955161500000000000000000000004" or missing value 02:45:06 executing program 7: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) [ 176.238362] loop4: detected capacity change from 0 to 264192 [ 176.322612] blktrace: Concurrent blktraces are not allowed on sg0 [ 176.340561] FAT-fs (loop4): Unrecognized mount option "000000000000047611214271844674407370955161500000000000000000000004" or missing value 02:45:06 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) 02:45:06 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) [ 176.424119] FAT-fs (loop3): Unrecognized mount option "000000000000071073042411844674407370955161500000000000000000000004" or missing value [ 176.494310] blktrace: Concurrent blktraces are not allowed on sg0 [ 176.534593] loop2: detected capacity change from 0 to 264192 [ 176.585155] loop1: detected capacity change from 0 to 264192 [ 176.609821] loop5: detected capacity change from 0 to 264192 [ 176.617810] FAT-fs (loop2): Unrecognized mount option "000000000000023612212361844674407370955161500000000000000000000004" or missing value [ 176.647302] FAT-fs (loop5): Unrecognized mount option "000000000000072141371141844674407370955161500000000000000000000004" or missing value [ 176.649697] FAT-fs (loop1): Unrecognized mount option "000000000000004116320521844674407370955161500000000000000000000004" or missing value 02:45:06 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) 02:45:06 executing program 7: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) 02:45:06 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) 02:45:06 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="38d21b3dc4b7e245d1ab6e7f6ec8155d25ac5bcaa8e1a4c73c408afc23efbb186de47a76401e7b264fc81c2fbe5e2f6682b68539a43f4e7333b1d965df51d7bc7cc38322ad92f5acfb9aed2b33a5059f75de53dc2848a1b70f40de666b62b52e094647ff4873b7182ed6e4be275ea03672926858174d0485c7d4a52c9bba70e44914f724d75f1161053e0009a358f44489a2b13a6fa9c38904b0d9fcb526304de11397dbc1b95277022578e1d3e3604f7fbe609e9309c9c746b0352a9f0ffd80fa7cf4d51b5b7bb93506", 0xca, r1) r5 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)='key_or_keyring:', r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r2}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r5, @ANYRESOCT=r0]) 02:45:06 executing program 2: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) 02:45:06 executing program 1: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) 02:45:06 executing program 0: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) 02:45:06 executing program 6: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) [ 176.881527] blktrace: Concurrent blktraces are not allowed on sg0 [ 176.891309] blktrace: Concurrent blktraces are not allowed on sg0 [ 176.902261] blktrace: Concurrent blktraces are not allowed on sg0 [ 176.913683] blktrace: Concurrent blktraces are not allowed on sg0 [ 176.925884] blktrace: Concurrent blktraces are not allowed on sg0 [ 176.965943] loop4: detected capacity change from 0 to 264192 [ 176.987651] loop3: detected capacity change from 0 to 264192 [ 176.994205] loop5: detected capacity change from 0 to 264192 02:45:07 executing program 0: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) 02:45:07 executing program 1: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) 02:45:07 executing program 6: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) [ 177.180267] FAT-fs (loop4): Unrecognized mount option "000000000000055723120421844674407370955161500000000000000000000004" or missing value 02:45:07 executing program 7: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) [ 177.191744] FAT-fs (loop3): Unrecognized mount option "000000000000056365327271844674407370955161500000000000000000000004" or missing value [ 177.246164] blktrace: Concurrent blktraces are not allowed on sg0 [ 177.248193] blktrace: Concurrent blktraces are not allowed on sg0 [ 177.255300] blktrace: Concurrent blktraces are not allowed on sg0 [ 177.293928] FAT-fs (loop5): Unrecognized mount option "000000000000071312627261844674407370955161500000000000000000000004" or missing value [ 177.303304] blktrace: Concurrent blktraces are not allowed on sg0 02:45:07 executing program 1: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x180, 0x7, 0x0, 0x0, 0x8001}, r3, 0xffffffffffffffff, r2, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) r5 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000040)={r5, 0x40, 0xfffffffffffffff8}) 02:45:07 executing program 0: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x41) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000011c0)="25f603b7fa9fa3548414f40992c1cf45f19705c7eee437fda4265b7eb2e7bb1ca4ec9b16e7d8334d052aeb04b0d5037a01019288274bf0cb88e4b0d450527f3e3100845f824bd7c768b941db8d3d5f400ea29894fe6bc6553b229e9e616dbeb1b077c3ff25d19fa7ce2453d6417761", 0x6f) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r1, &(0x7f0000000080)="01", 0x41030) close(r1) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2, 0xff, 0x0, r3}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x VM DIAGNOSIS: 02:44:59 Registers: info registers vcpu 0 RAX=0000000000000076 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff823ba131 RDI=ffffffff8765a980 RBP=ffffffff8765a940 RSP=ffff888031597690 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000076 R11=0000000000000001 R12=0000000000000076 R13=ffffffff8765a940 R14=0000000000000010 R15=ffffffff823ba120 RIP=ffffffff823ba189 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f20d7ad2700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f0a466ba260 CR3=000000002c6b0000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007f20da6437c0 00007f20da6437c8 YMM02=0000000000000000 0000000000000000 00007f20da6437e0 00007f20da6437c0 YMM03=0000000000000000 0000000000000000 00007f20da6437c8 00007f20da6437c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000080000002 RBX=ffff88800f885040 RCX=0000000080000002 RDX=1ffff11001275740 RSI=ffffffff811da370 RDI=ffff8880093aba00 RBP=dffffc0000000000 RSP=ffff88800fbffd88 R8 =0000000000000000 R9 =ffff8880093aba07 R10=ffffed1001275740 R11=0000000000000001 R12=ffffc90008269ff9 R13=ffff88800f885040 R14=0000000000000000 R15=0000000000000092 RIP=ffffffff81460cad RFL=00000046 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f52f6cb11f0 CR3=000000000f304000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 ffffffffffffffff ffffffffffffffff YMM02=0000000000000000 0000000000000000 00524f5252450040 0000000000000000 YMM03=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM04=0000000000000000 0000000000000000 0000000000000000 00000000000000ff YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000