syzkaller login: [ 41.771644] sshd (242) used greatest stack depth: 24744 bytes left Warning: Permanently added '[localhost]:5444' (ECDSA) to the list of known hosts. 2022/09/13 13:09:43 fuzzer started 2022/09/13 13:09:43 dialing manager at localhost:36597 [ 43.862837] cgroup: Unknown subsys name 'net' [ 43.953727] cgroup: Unknown subsys name 'rlimit' 2022/09/13 13:09:58 syscalls: 2215 2022/09/13 13:09:58 code coverage: enabled 2022/09/13 13:09:58 comparison tracing: enabled 2022/09/13 13:09:58 extra coverage: enabled 2022/09/13 13:09:58 setuid sandbox: enabled 2022/09/13 13:09:58 namespace sandbox: enabled 2022/09/13 13:09:58 Android sandbox: enabled 2022/09/13 13:09:58 fault injection: enabled 2022/09/13 13:09:58 leak checking: enabled 2022/09/13 13:09:58 net packet injection: enabled 2022/09/13 13:09:58 net device setup: enabled 2022/09/13 13:09:58 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/13 13:09:58 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/13 13:09:58 USB emulation: enabled 2022/09/13 13:09:58 hci packet injection: enabled 2022/09/13 13:09:58 wifi device emulation: failed to parse kernel version (6.0.0-rc5-next-20220913) 2022/09/13 13:09:58 802.15.4 emulation: enabled 2022/09/13 13:09:58 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/13 13:09:59 fetching corpus: 30, signal 25504/28628 (executing program) 2022/09/13 13:09:59 fetching corpus: 80, signal 44171/47863 (executing program) 2022/09/13 13:09:59 fetching corpus: 130, signal 56273/60323 (executing program) 2022/09/13 13:09:59 fetching corpus: 180, signal 65065/69343 (executing program) 2022/09/13 13:10:00 fetching corpus: 230, signal 72287/76607 (executing program) 2022/09/13 13:10:00 fetching corpus: 280, signal 77835/82209 (executing program) 2022/09/13 13:10:00 fetching corpus: 330, signal 82355/86725 (executing program) 2022/09/13 13:10:00 fetching corpus: 380, signal 88804/92694 (executing program) 2022/09/13 13:10:00 fetching corpus: 430, signal 93707/97130 (executing program) 2022/09/13 13:10:01 fetching corpus: 480, signal 96740/99913 (executing program) 2022/09/13 13:10:01 fetching corpus: 530, signal 101273/103809 (executing program) 2022/09/13 13:10:01 fetching corpus: 580, signal 103911/106105 (executing program) 2022/09/13 13:10:01 fetching corpus: 630, signal 107301/108759 (executing program) 2022/09/13 13:10:01 fetching corpus: 656, signal 109276/110295 (executing program) 2022/09/13 13:10:01 fetching corpus: 656, signal 109276/110370 (executing program) 2022/09/13 13:10:01 fetching corpus: 656, signal 109276/110431 (executing program) 2022/09/13 13:10:01 fetching corpus: 656, signal 109276/110506 (executing program) 2022/09/13 13:10:01 fetching corpus: 656, signal 109276/110571 (executing program) 2022/09/13 13:10:01 fetching corpus: 656, signal 109276/110648 (executing program) 2022/09/13 13:10:01 fetching corpus: 656, signal 109276/110713 (executing program) 2022/09/13 13:10:01 fetching corpus: 656, signal 109276/110780 (executing program) 2022/09/13 13:10:01 fetching corpus: 656, signal 109276/110842 (executing program) 2022/09/13 13:10:01 fetching corpus: 656, signal 109276/110905 (executing program) 2022/09/13 13:10:01 fetching corpus: 656, signal 109276/110975 (executing program) 2022/09/13 13:10:01 fetching corpus: 656, signal 109276/111047 (executing program) 2022/09/13 13:10:01 fetching corpus: 656, signal 109276/111123 (executing program) 2022/09/13 13:10:02 fetching corpus: 656, signal 109276/111179 (executing program) 2022/09/13 13:10:02 fetching corpus: 656, signal 109276/111248 (executing program) 2022/09/13 13:10:02 fetching corpus: 656, signal 109276/111325 (executing program) 2022/09/13 13:10:02 fetching corpus: 656, signal 109276/111402 (executing program) 2022/09/13 13:10:02 fetching corpus: 656, signal 109276/111460 (executing program) 2022/09/13 13:10:02 fetching corpus: 656, signal 109276/111528 (executing program) 2022/09/13 13:10:02 fetching corpus: 656, signal 109276/111604 (executing program) 2022/09/13 13:10:02 fetching corpus: 656, signal 109276/111669 (executing program) 2022/09/13 13:10:02 fetching corpus: 656, signal 109276/111742 (executing program) 2022/09/13 13:10:02 fetching corpus: 656, signal 109276/111810 (executing program) 2022/09/13 13:10:02 fetching corpus: 656, signal 109276/111880 (executing program) 2022/09/13 13:10:02 fetching corpus: 656, signal 109276/111972 (executing program) 2022/09/13 13:10:02 fetching corpus: 656, signal 109276/112042 (executing program) 2022/09/13 13:10:02 fetching corpus: 656, signal 109276/112108 (executing program) 2022/09/13 13:10:02 fetching corpus: 656, signal 109276/112192 (executing program) 2022/09/13 13:10:02 fetching corpus: 656, signal 109276/112264 (executing program) 2022/09/13 13:10:02 fetching corpus: 656, signal 109276/112332 (executing program) 2022/09/13 13:10:02 fetching corpus: 656, signal 109276/112395 (executing program) 2022/09/13 13:10:02 fetching corpus: 656, signal 109276/112453 (executing program) 2022/09/13 13:10:02 fetching corpus: 656, signal 109276/112510 (executing program) 2022/09/13 13:10:02 fetching corpus: 656, signal 109276/112571 (executing program) 2022/09/13 13:10:02 fetching corpus: 656, signal 109276/112646 (executing program) 2022/09/13 13:10:02 fetching corpus: 656, signal 109276/112721 (executing program) 2022/09/13 13:10:02 fetching corpus: 656, signal 109276/112784 (executing program) 2022/09/13 13:10:02 fetching corpus: 656, signal 109276/112861 (executing program) 2022/09/13 13:10:02 fetching corpus: 656, signal 109276/112936 (executing program) 2022/09/13 13:10:02 fetching corpus: 656, signal 109276/113015 (executing program) 2022/09/13 13:10:02 fetching corpus: 656, signal 109276/113079 (executing program) 2022/09/13 13:10:02 fetching corpus: 656, signal 109276/113079 (executing program) 2022/09/13 13:10:05 starting 8 fuzzer processes 13:10:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg$sock(r0, &(0x7f0000002800)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000000)="a0", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000480)='Q', 0x1}], 0x1, &(0x7f0000000780)=[@txtime={{0x18}}], 0x18}}], 0x2, 0x0) 13:10:05 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r0, 0x4b69, 0xfffffffffffffffe) 13:10:05 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_set$pid(0x2, 0x0, 0x2007) ioprio_get$pid(0x3, 0x0) 13:10:05 executing program 3: syz_usb_connect$hid(0x3, 0x36, &(0x7f0000000880)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e7d, 0x2d50, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) 13:10:05 executing program 4: mq_open(&(0x7f00000001c0)='\x98Q\xcd\b\xe7]\x01\x00\x00\x00\x00\x00\xd0\xcfu$\xc9W\xe4\xcc\xaa\x00\x00\x18 z$/\a\x91\xd5\xd0\x04@\x86\xe9\x98\xfe\xef\x1b\x13\xae(\xc4\x8b\xc4\x05\x80{b\xd8@\xc4\a\xaa\xeb\xc1a-$\xb9\x0f\xa8\x12\xe4\x8b\x8a\x0e3\xde\xcb\xb2\xb288^\x94\x00\xfc*\x83M\xfb\x02\xd9\x0e\xaf\x80+\x1f\x89d\xd7n\xd7', 0x842, 0x0, 0x0) 13:10:05 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) read(r0, 0x0, 0x0) 13:10:05 executing program 6: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_emit_ethernet(0x66, &(0x7f00000001c0)={@local, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "2ddc20", 0x30, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "f2e2a6", 0x0, 0x0, 0x0, @dev, @remote}}}}}}}, 0x0) 13:10:05 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f00000000c0)=0x3, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000140)={@multicast, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x1c, 0x0, @opaque="e3704100000000da07dbd83db8f73dc34f1079e4"}}}}}, 0x0) [ 64.869363] audit: type=1400 audit(1663074605.104:6): avc: denied { execmem } for pid=285 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 66.129593] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 66.131392] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 66.132820] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 66.134455] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 66.136248] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 66.137764] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 66.138891] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 66.144487] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 66.145553] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 66.146791] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 66.151825] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 66.153062] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 66.155386] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 66.158714] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 66.161498] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 66.162772] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 66.163738] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 66.172632] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 66.173922] Bluetooth: hci0: HCI_REQ-0x0c1a [ 66.185446] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 66.187155] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 66.189051] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 66.190725] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 66.193656] Bluetooth: hci4: HCI_REQ-0x0c1a [ 66.203355] Bluetooth: hci2: HCI_REQ-0x0c1a [ 66.204951] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 66.210786] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 66.212462] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 66.216769] Bluetooth: hci3: HCI_REQ-0x0c1a [ 66.228953] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 66.236279] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 66.239491] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 66.241145] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 66.242653] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 66.247825] Bluetooth: hci1: HCI_REQ-0x0c1a [ 66.248498] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 66.256079] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 66.258652] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 66.260151] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 66.261676] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 66.262979] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 66.267569] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 66.268889] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 66.271495] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 66.272849] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 66.274535] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 66.284609] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 66.295342] Bluetooth: hci6: HCI_REQ-0x0c1a [ 66.343307] Bluetooth: hci7: HCI_REQ-0x0c1a [ 68.198324] Bluetooth: hci5: Opcode 0x c03 failed: -110 [ 68.198836] Bluetooth: hci0: command 0x0409 tx timeout [ 68.262251] Bluetooth: hci2: command 0x0409 tx timeout [ 68.262352] Bluetooth: hci1: command 0x0409 tx timeout [ 68.263584] Bluetooth: hci3: command 0x0409 tx timeout [ 68.264611] Bluetooth: hci4: command 0x0409 tx timeout [ 68.326252] Bluetooth: hci6: command 0x0409 tx timeout [ 68.390229] Bluetooth: hci7: command 0x0409 tx timeout [ 70.246251] Bluetooth: hci0: command 0x041b tx timeout [ 70.310253] Bluetooth: hci4: command 0x041b tx timeout [ 70.310728] Bluetooth: hci3: command 0x041b tx timeout [ 70.312508] Bluetooth: hci1: command 0x041b tx timeout [ 70.312964] Bluetooth: hci2: command 0x041b tx timeout [ 70.374288] Bluetooth: hci6: command 0x041b tx timeout [ 70.438276] Bluetooth: hci7: command 0x041b tx timeout [ 71.151102] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 71.153151] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 71.155073] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 71.167772] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 71.183384] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 71.195557] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 71.201273] Bluetooth: hci5: HCI_REQ-0x0c1a [ 72.294204] Bluetooth: hci0: command 0x040f tx timeout [ 72.358235] Bluetooth: hci2: command 0x040f tx timeout [ 72.358657] Bluetooth: hci1: command 0x040f tx timeout [ 72.359059] Bluetooth: hci3: command 0x040f tx timeout [ 72.359612] Bluetooth: hci4: command 0x040f tx timeout [ 72.422207] Bluetooth: hci6: command 0x040f tx timeout [ 72.486261] Bluetooth: hci7: command 0x040f tx timeout [ 73.254240] Bluetooth: hci5: command 0x0409 tx timeout [ 74.342215] Bluetooth: hci0: command 0x0419 tx timeout [ 74.406224] Bluetooth: hci3: command 0x0419 tx timeout [ 74.406230] Bluetooth: hci4: command 0x0419 tx timeout [ 74.406647] Bluetooth: hci1: command 0x0419 tx timeout [ 74.408006] Bluetooth: hci2: command 0x0419 tx timeout [ 74.471237] Bluetooth: hci6: command 0x0419 tx timeout [ 74.535250] Bluetooth: hci7: command 0x0419 tx timeout [ 75.303283] Bluetooth: hci5: command 0x041b tx timeout [ 77.350254] Bluetooth: hci5: command 0x040f tx timeout [ 79.398305] Bluetooth: hci5: command 0x0419 tx timeout 13:10:58 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f00000000c0)=0x3, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000140)={@multicast, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x1c, 0x0, @opaque="e3704100000000da07dbd83db8f73dc34f1079e4"}}}}}, 0x0) 13:10:58 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f00000000c0)=0x3, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000140)={@multicast, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x1c, 0x0, @opaque="e3704100000000da07dbd83db8f73dc34f1079e4"}}}}}, 0x0) 13:10:58 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f00000000c0)=0x3, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000140)={@multicast, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x1c, 0x0, @opaque="e3704100000000da07dbd83db8f73dc34f1079e4"}}}}}, 0x0) 13:10:58 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f00000000c0)=0x3, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000140)={@multicast, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x1c, 0x0, @opaque="e3704100000000da07dbd83db8f73dc34f1079e4"}}}}}, 0x0) 13:10:58 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f00000000c0)=0x3, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000140)={@multicast, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x1c, 0x0, @opaque="e3704100000000da07dbd83db8f73dc34f1079e4"}}}}}, 0x0) 13:10:58 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f00000000c0)=0x3, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000140)={@multicast, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x1c, 0x0, @opaque="e3704100000000da07dbd83db8f73dc34f1079e4"}}}}}, 0x0) 13:10:58 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f00000000c0)=0x3, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000140)={@multicast, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x1c, 0x0, @opaque="e3704100000000da07dbd83db8f73dc34f1079e4"}}}}}, 0x0) 13:10:59 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f00000000c0)=0x3, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000140)={@multicast, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x1c, 0x0, @opaque="e3704100000000da07dbd83db8f73dc34f1079e4"}}}}}, 0x0) [ 119.508939] audit: type=1400 audit(1663074659.743:7): avc: denied { open } for pid=3876 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 119.511916] audit: type=1400 audit(1663074659.744:8): avc: denied { kernel } for pid=3876 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 120.257961] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 120.259069] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 120.763634] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 120.764797] misc raw-gadget: fail, usb_gadget_register_driver returned -16 13:11:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg$sock(r0, &(0x7f0000002800)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000000)="a0", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000480)='Q', 0x1}], 0x1, &(0x7f0000000780)=[@txtime={{0x18}}], 0x18}}], 0x2, 0x0) 13:11:01 executing program 4: mq_open(&(0x7f00000001c0)='\x98Q\xcd\b\xe7]\x01\x00\x00\x00\x00\x00\xd0\xcfu$\xc9W\xe4\xcc\xaa\x00\x00\x18 z$/\a\x91\xd5\xd0\x04@\x86\xe9\x98\xfe\xef\x1b\x13\xae(\xc4\x8b\xc4\x05\x80{b\xd8@\xc4\a\xaa\xeb\xc1a-$\xb9\x0f\xa8\x12\xe4\x8b\x8a\x0e3\xde\xcb\xb2\xb288^\x94\x00\xfc*\x83M\xfb\x02\xd9\x0e\xaf\x80+\x1f\x89d\xd7n\xd7', 0x842, 0x0, 0x0) 13:11:01 executing program 3: syz_usb_connect$hid(0x3, 0x36, &(0x7f0000000880)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e7d, 0x2d50, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) 13:11:01 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) read(r0, 0x0, 0x0) 13:11:01 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f00000000c0)=0x3, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000140)={@multicast, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x1c, 0x0, @opaque="e3704100000000da07dbd83db8f73dc34f1079e4"}}}}}, 0x0) 13:11:01 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r0, 0x4b69, 0xfffffffffffffffe) 13:11:01 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_set$pid(0x2, 0x0, 0x2007) ioprio_get$pid(0x3, 0x0) 13:11:01 executing program 6: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_emit_ethernet(0x66, &(0x7f00000001c0)={@local, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "2ddc20", 0x30, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "f2e2a6", 0x0, 0x0, 0x0, @dev, @remote}}}}}}}, 0x0) [ 121.417291] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 121.420362] misc raw-gadget: fail, usb_gadget_register_driver returned -16 13:11:01 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_set$pid(0x2, 0x0, 0x2007) ioprio_get$pid(0x3, 0x0) 13:11:01 executing program 6: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_emit_ethernet(0x66, &(0x7f00000001c0)={@local, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "2ddc20", 0x30, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "f2e2a6", 0x0, 0x0, 0x0, @dev, @remote}}}}}}}, 0x0) 13:11:01 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) read(r0, 0x0, 0x0) 13:11:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg$sock(r0, &(0x7f0000002800)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000000)="a0", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000480)='Q', 0x1}], 0x1, &(0x7f0000000780)=[@txtime={{0x18}}], 0x18}}], 0x2, 0x0) 13:11:02 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_set$pid(0x2, 0x0, 0x2007) ioprio_get$pid(0x3, 0x0) 13:11:02 executing program 4: mq_open(&(0x7f00000001c0)='\x98Q\xcd\b\xe7]\x01\x00\x00\x00\x00\x00\xd0\xcfu$\xc9W\xe4\xcc\xaa\x00\x00\x18 z$/\a\x91\xd5\xd0\x04@\x86\xe9\x98\xfe\xef\x1b\x13\xae(\xc4\x8b\xc4\x05\x80{b\xd8@\xc4\a\xaa\xeb\xc1a-$\xb9\x0f\xa8\x12\xe4\x8b\x8a\x0e3\xde\xcb\xb2\xb288^\x94\x00\xfc*\x83M\xfb\x02\xd9\x0e\xaf\x80+\x1f\x89d\xd7n\xd7', 0x842, 0x0, 0x0) 13:11:02 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r0, 0x4b69, 0xfffffffffffffffe) 13:11:02 executing program 6: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_emit_ethernet(0x66, &(0x7f00000001c0)={@local, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "2ddc20", 0x30, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "f2e2a6", 0x0, 0x0, 0x0, @dev, @remote}}}}}}}, 0x0) 13:11:02 executing program 3: syz_usb_connect$hid(0x3, 0x36, &(0x7f0000000880)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e7d, 0x2d50, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) 13:11:02 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) read(r0, 0x0, 0x0) 13:11:02 executing program 7: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) read(r0, 0x0, 0x0) [ 122.029477] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy 13:11:02 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_set$pid(0x2, 0x0, 0x2007) ioprio_get$pid(0x3, 0x0) [ 122.040387] misc raw-gadget: fail, usb_gadget_register_driver returned -16 13:11:02 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f00000000c0)=0x3, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000140)={@multicast, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x1c, 0x0, @opaque="e3704100000000da07dbd83db8f73dc34f1079e4"}}}}}, 0x0) 13:11:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg$sock(r0, &(0x7f0000002800)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000000)="a0", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000480)='Q', 0x1}], 0x1, &(0x7f0000000780)=[@txtime={{0x18}}], 0x18}}], 0x2, 0x0) 13:11:02 executing program 7: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) read(r0, 0x0, 0x0) 13:11:02 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r0, 0x4b69, 0xfffffffffffffffe) 13:11:02 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f00000000c0)=0x3, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000140)={@multicast, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x1c, 0x0, @opaque="e3704100000000da07dbd83db8f73dc34f1079e4"}}}}}, 0x0) 13:11:02 executing program 7: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) read(r0, 0x0, 0x0) 13:11:02 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_set$pid(0x2, 0x0, 0x2007) ioprio_get$pid(0x3, 0x0) 13:11:02 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x42, &(0x7f0000000040)={@local, @local, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '#\x00\b', 0xc, 0x11, 0x0, @empty, @local, {[], {0x0, 0x0, 0xc, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}}}}}}}}, 0x0) 13:11:02 executing program 4: mq_open(&(0x7f00000001c0)='\x98Q\xcd\b\xe7]\x01\x00\x00\x00\x00\x00\xd0\xcfu$\xc9W\xe4\xcc\xaa\x00\x00\x18 z$/\a\x91\xd5\xd0\x04@\x86\xe9\x98\xfe\xef\x1b\x13\xae(\xc4\x8b\xc4\x05\x80{b\xd8@\xc4\a\xaa\xeb\xc1a-$\xb9\x0f\xa8\x12\xe4\x8b\x8a\x0e3\xde\xcb\xb2\xb288^\x94\x00\xfc*\x83M\xfb\x02\xd9\x0e\xaf\x80+\x1f\x89d\xd7n\xd7', 0x842, 0x0, 0x0) 13:11:02 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f00000000c0)=0x3, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000140)={@multicast, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x1c, 0x0, @opaque="e3704100000000da07dbd83db8f73dc34f1079e4"}}}}}, 0x0) 13:11:02 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_set$pid(0x2, 0x0, 0x2007) ioprio_get$pid(0x3, 0x0) 13:11:02 executing program 0: mbind(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x8000, &(0x7f0000000000), 0x81, 0x0) 13:11:02 executing program 3: syz_usb_connect$hid(0x3, 0x36, &(0x7f0000000880)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e7d, 0x2d50, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) 13:11:02 executing program 7: setuid(0xee00) prctl$PR_SET_SECUREBITS(0x18, 0x0) 13:11:02 executing program 2: clone(0x13000000, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)="8482b87a0f1c33136bd555121b5a6f8f70acfa2cc77b074ec5ac8789b41e4835cb06f0743e62322ae8eb3c9376140d41650e8092083f3c17f3112084519269b8980d4649965d853f58a8df14362903c78e07a16ce0de0331be12492c0708f16c5d17efb5d8ff96bf2dcae31d1fe0d406c395b13a83c63bb383223264742f10fa98046a27b45c") 13:11:02 executing program 1: syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file1\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@mpol={'mpol', 0x3d, {'bind', '', @val={0x3a, [0x2c, 0x30, 0x0]}}}}]}) 13:11:02 executing program 0: mbind(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x8000, &(0x7f0000000000), 0x81, 0x0) 13:11:02 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x42, &(0x7f0000000040)={@local, @local, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '#\x00\b', 0xc, 0x11, 0x0, @empty, @local, {[], {0x0, 0x0, 0xc, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}}}}}}}}, 0x0) 13:11:02 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pread64(r0, &(0x7f0000000040)=""/188, 0xbc, 0x400000000000000) 13:11:02 executing program 4: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000040)) ioctl$BTRFS_IOC_DEFRAG(r0, 0x50009402, 0x0) [ 122.650978] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 122.656340] misc raw-gadget: fail, usb_gadget_register_driver returned -16 13:11:02 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x42, &(0x7f0000000040)={@local, @local, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '#\x00\b', 0xc, 0x11, 0x0, @empty, @local, {[], {0x0, 0x0, 0xc, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}}}}}}}}, 0x0) 13:11:02 executing program 4: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000040)) ioctl$BTRFS_IOC_DEFRAG(r0, 0x50009402, 0x0) 13:11:02 executing program 7: setuid(0xee00) prctl$PR_SET_SECUREBITS(0x18, 0x0) 13:11:02 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pread64(r0, &(0x7f0000000040)=""/188, 0xbc, 0x400000000000000) 13:11:02 executing program 0: mbind(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x8000, &(0x7f0000000000), 0x81, 0x0) 13:11:03 executing program 1: syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file1\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@mpol={'mpol', 0x3d, {'bind', '', @val={0x3a, [0x2c, 0x30, 0x0]}}}}]}) 13:11:03 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x42, &(0x7f0000000040)={@local, @local, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '#\x00\b', 0xc, 0x11, 0x0, @empty, @local, {[], {0x0, 0x0, 0xc, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}}}}}}}}, 0x0) 13:11:03 executing program 4: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000040)) ioctl$BTRFS_IOC_DEFRAG(r0, 0x50009402, 0x0) 13:11:03 executing program 1: syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file1\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@mpol={'mpol', 0x3d, {'bind', '', @val={0x3a, [0x2c, 0x30, 0x0]}}}}]}) 13:11:03 executing program 2: clone(0x13000000, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)="8482b87a0f1c33136bd555121b5a6f8f70acfa2cc77b074ec5ac8789b41e4835cb06f0743e62322ae8eb3c9376140d41650e8092083f3c17f3112084519269b8980d4649965d853f58a8df14362903c78e07a16ce0de0331be12492c0708f16c5d17efb5d8ff96bf2dcae31d1fe0d406c395b13a83c63bb383223264742f10fa98046a27b45c") 13:11:03 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pread64(r0, &(0x7f0000000040)=""/188, 0xbc, 0x400000000000000) 13:11:03 executing program 5: setuid(0xee00) prctl$PR_SET_SECUREBITS(0x18, 0x0) 13:11:03 executing program 4: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000040)) ioctl$BTRFS_IOC_DEFRAG(r0, 0x50009402, 0x0) 13:11:03 executing program 7: setuid(0xee00) prctl$PR_SET_SECUREBITS(0x18, 0x0) 13:11:03 executing program 0: mbind(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x8000, &(0x7f0000000000), 0x81, 0x0) 13:11:03 executing program 7: setuid(0xee00) prctl$PR_SET_SECUREBITS(0x18, 0x0) 13:11:03 executing program 5: setuid(0xee00) prctl$PR_SET_SECUREBITS(0x18, 0x0) [ 123.388197] ------------[ cut here ]------------ [ 123.388236] [ 123.388240] ====================================================== [ 123.388245] WARNING: possible circular locking dependency detected [ 123.388251] 6.0.0-rc5-next-20220913 #1 Not tainted [ 123.388261] ------------------------------------------------------ [ 123.388265] syz-executor.4/4092 is trying to acquire lock: [ 123.388275] ffffffff853fa878 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 123.388325] [ 123.388325] but task is already holding lock: [ 123.388328] ffff88800e806820 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 123.388368] [ 123.388368] which lock already depends on the new lock. [ 123.388368] [ 123.388373] [ 123.388373] the existing dependency chain (in reverse order) is: [ 123.388377] [ 123.388377] -> #3 (&ctx->lock){....}-{2:2}: [ 123.388398] _raw_spin_lock+0x2a/0x40 [ 123.388423] __perf_event_task_sched_out+0x53b/0x18d0 [ 123.388441] __schedule+0xedd/0x2470 [ 123.388455] schedule+0xda/0x1b0 [ 123.388469] exit_to_user_mode_prepare+0x114/0x1a0 [ 123.388500] syscall_exit_to_user_mode+0x19/0x40 [ 123.388526] do_syscall_64+0x48/0x90 [ 123.388546] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 123.388572] [ 123.388572] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 123.388593] _raw_spin_lock_nested+0x30/0x40 [ 123.388615] raw_spin_rq_lock_nested+0x1e/0x30 [ 123.388633] task_fork_fair+0x63/0x4d0 [ 123.388659] sched_cgroup_fork+0x3d0/0x540 [ 123.388680] copy_process+0x3f9e/0x6df0 [ 123.388695] kernel_clone+0xe7/0x890 [ 123.388709] user_mode_thread+0xad/0xf0 [ 123.388724] rest_init+0x24/0x250 [ 123.388749] arch_call_rest_init+0xf/0x14 [ 123.388778] start_kernel+0x4c1/0x4e6 [ 123.388803] secondary_startup_64_no_verify+0xe0/0xeb [ 123.388824] [ 123.388824] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 123.388844] _raw_spin_lock_irqsave+0x39/0x60 [ 123.388867] try_to_wake_up+0xab/0x1920 [ 123.388887] up+0x75/0xb0 [ 123.388904] __up_console_sem+0x6e/0x80 [ 123.388927] console_unlock+0x46a/0x590 [ 123.388951] vprintk_emit+0x1bd/0x560 [ 123.388976] vprintk+0x84/0xa0 [ 123.389001] _printk+0xba/0xf1 [ 123.389027] kauditd_hold_skb.cold+0x3f/0x4e [ 123.389047] kauditd_send_queue+0x233/0x290 [ 123.389069] kauditd_thread+0x5da/0x9a0 [ 123.389090] kthread+0x2ed/0x3a0 [ 123.389112] ret_from_fork+0x22/0x30 [ 123.389130] [ 123.389130] -> #0 ((console_sem).lock){....}-{2:2}: [ 123.389151] __lock_acquire+0x2a02/0x5e70 [ 123.389176] lock_acquire+0x1a2/0x530 [ 123.389200] _raw_spin_lock_irqsave+0x39/0x60 [ 123.389222] down_trylock+0xe/0x70 [ 123.389241] __down_trylock_console_sem+0x3b/0xd0 [ 123.389265] vprintk_emit+0x16b/0x560 [ 123.389290] vprintk+0x84/0xa0 [ 123.389314] _printk+0xba/0xf1 [ 123.389339] report_bug.cold+0x72/0xab [ 123.389357] handle_bug+0x3c/0x70 [ 123.389376] exc_invalid_op+0x14/0x50 [ 123.389396] asm_exc_invalid_op+0x16/0x20 [ 123.389420] group_sched_out.part.0+0x2c7/0x460 [ 123.389436] ctx_sched_out+0x8f1/0xc10 [ 123.389450] __perf_event_task_sched_out+0x6d0/0x18d0 [ 123.389468] __schedule+0xedd/0x2470 [ 123.389482] schedule+0xda/0x1b0 [ 123.389496] exit_to_user_mode_prepare+0x114/0x1a0 [ 123.389525] syscall_exit_to_user_mode+0x19/0x40 [ 123.389551] do_syscall_64+0x48/0x90 [ 123.389570] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 123.389596] [ 123.389596] other info that might help us debug this: [ 123.389596] [ 123.389600] Chain exists of: [ 123.389600] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 123.389600] [ 123.389622] Possible unsafe locking scenario: [ 123.389622] [ 123.389625] CPU0 CPU1 [ 123.389629] ---- ---- [ 123.389632] lock(&ctx->lock); [ 123.389640] lock(&rq->__lock); [ 123.389650] lock(&ctx->lock); [ 123.389659] lock((console_sem).lock); [ 123.389667] [ 123.389667] *** DEADLOCK *** [ 123.389667] [ 123.389670] 2 locks held by syz-executor.4/4092: [ 123.389680] #0: ffff88806ce37cd8 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 123.389718] #1: ffff88800e806820 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 123.389759] [ 123.389759] stack backtrace: [ 123.389763] CPU: 0 PID: 4092 Comm: syz-executor.4 Not tainted 6.0.0-rc5-next-20220913 #1 [ 123.389781] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 123.389793] Call Trace: [ 123.389798] [ 123.389804] dump_stack_lvl+0x8b/0xb3 [ 123.389825] check_noncircular+0x263/0x2e0 [ 123.389851] ? format_decode+0x26c/0xb50 [ 123.389873] ? print_circular_bug+0x450/0x450 [ 123.389899] ? enable_ptr_key_workfn+0x20/0x20 [ 123.389921] ? format_decode+0x26c/0xb50 [ 123.389944] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 123.389971] __lock_acquire+0x2a02/0x5e70 [ 123.390003] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 123.390038] lock_acquire+0x1a2/0x530 [ 123.390063] ? down_trylock+0xe/0x70 [ 123.390085] ? rcu_read_unlock+0x40/0x40 [ 123.390114] ? __lock_acquire+0x164d/0x5e70 [ 123.390142] ? vprintk+0x84/0xa0 [ 123.390169] _raw_spin_lock_irqsave+0x39/0x60 [ 123.390193] ? down_trylock+0xe/0x70 [ 123.390213] down_trylock+0xe/0x70 [ 123.390233] ? vprintk+0x84/0xa0 [ 123.390259] __down_trylock_console_sem+0x3b/0xd0 [ 123.390286] vprintk_emit+0x16b/0x560 [ 123.390315] vprintk+0x84/0xa0 [ 123.390341] _printk+0xba/0xf1 [ 123.390368] ? record_print_text.cold+0x16/0x16 [ 123.390401] ? report_bug.cold+0x66/0xab [ 123.390422] ? group_sched_out.part.0+0x2c7/0x460 [ 123.390439] report_bug.cold+0x72/0xab [ 123.390462] handle_bug+0x3c/0x70 [ 123.390482] exc_invalid_op+0x14/0x50 [ 123.390504] asm_exc_invalid_op+0x16/0x20 [ 123.390530] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 123.390549] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 123.390567] RSP: 0018:ffff88803fb4fc48 EFLAGS: 00010006 [ 123.390580] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 123.390592] RDX: ffff888020815040 RSI: ffffffff81566027 RDI: 0000000000000005 [ 123.390603] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 123.390614] R10: 0000000000000000 R11: ffffffff865aa01b R12: ffff88800e806800 [ 123.390626] R13: ffff88806ce3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 123.390643] ? group_sched_out.part.0+0x2c7/0x460 [ 123.390662] ? group_sched_out.part.0+0x2c7/0x460 [ 123.390681] ctx_sched_out+0x8f1/0xc10 [ 123.390700] __perf_event_task_sched_out+0x6d0/0x18d0 [ 123.390723] ? lock_is_held_type+0xd7/0x130 [ 123.390750] ? __perf_cgroup_move+0x160/0x160 [ 123.390768] ? set_next_entity+0x304/0x550 [ 123.390795] ? update_curr+0x267/0x740 [ 123.390823] ? lock_is_held_type+0xd7/0x130 [ 123.390851] __schedule+0xedd/0x2470 [ 123.390870] ? io_schedule_timeout+0x150/0x150 [ 123.390889] ? rcu_read_lock_sched_held+0x3e/0x80 [ 123.390920] schedule+0xda/0x1b0 [ 123.390937] exit_to_user_mode_prepare+0x114/0x1a0 [ 123.390968] syscall_exit_to_user_mode+0x19/0x40 [ 123.390995] do_syscall_64+0x48/0x90 [ 123.391016] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 123.391043] RIP: 0033:0x7f93f676db19 [ 123.391055] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 123.391072] RSP: 002b:00007f93f3ce3218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 123.391088] RAX: 0000000000000001 RBX: 00007f93f6880f68 RCX: 00007f93f676db19 [ 123.391099] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f93f6880f6c [ 123.391110] RBP: 00007f93f6880f60 R08: 000000000000000e R09: 0000000000000000 [ 123.391121] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f93f6880f6c [ 123.391132] R13: 00007ffc6d7f5abf R14: 00007f93f3ce3300 R15: 0000000000022000 [ 123.391151] [ 123.467114] WARNING: CPU: 0 PID: 4092 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 123.467941] Modules linked in: [ 123.468230] CPU: 0 PID: 4092 Comm: syz-executor.4 Not tainted 6.0.0-rc5-next-20220913 #1 [ 123.468941] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 123.469928] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 123.470412] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 123.472006] RSP: 0018:ffff88803fb4fc48 EFLAGS: 00010006 [ 123.472487] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 123.473121] RDX: ffff888020815040 RSI: ffffffff81566027 RDI: 0000000000000005 [ 123.473764] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 123.474397] R10: 0000000000000000 R11: ffffffff865aa01b R12: ffff88800e806800 [ 123.475035] R13: ffff88806ce3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 123.475679] FS: 00007f93f3ce3700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 123.476405] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 123.476923] CR2: 00007f93f6881018 CR3: 0000000008c00000 CR4: 0000000000350ef0 [ 123.477562] Call Trace: [ 123.477798] [ 123.478009] ctx_sched_out+0x8f1/0xc10 [ 123.478372] __perf_event_task_sched_out+0x6d0/0x18d0 [ 123.478843] ? lock_is_held_type+0xd7/0x130 [ 123.479245] ? __perf_cgroup_move+0x160/0x160 [ 123.479654] ? set_next_entity+0x304/0x550 [ 123.480048] ? update_curr+0x267/0x740 [ 123.480413] ? lock_is_held_type+0xd7/0x130 [ 123.480811] __schedule+0xedd/0x2470 [ 123.481158] ? io_schedule_timeout+0x150/0x150 [ 123.481582] ? rcu_read_lock_sched_held+0x3e/0x80 [ 123.482032] schedule+0xda/0x1b0 [ 123.482341] exit_to_user_mode_prepare+0x114/0x1a0 [ 123.482793] syscall_exit_to_user_mode+0x19/0x40 [ 123.483231] do_syscall_64+0x48/0x90 [ 123.483576] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 123.484062] RIP: 0033:0x7f93f676db19 [ 123.484398] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 123.486015] RSP: 002b:00007f93f3ce3218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 123.486690] RAX: 0000000000000001 RBX: 00007f93f6880f68 RCX: 00007f93f676db19 [ 123.487325] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f93f6880f6c [ 123.487970] RBP: 00007f93f6880f60 R08: 000000000000000e R09: 0000000000000000 [ 123.488605] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f93f6880f6c [ 123.489239] R13: 00007ffc6d7f5abf R14: 00007f93f3ce3300 R15: 0000000000022000 [ 123.489881] [ 123.490095] irq event stamp: 252 [ 123.490402] hardirqs last enabled at (251): [] exit_to_user_mode_prepare+0x109/0x1a0 [ 123.491242] hardirqs last disabled at (252): [] __schedule+0x1225/0x2470 [ 123.491986] softirqs last enabled at (0): [] copy_process+0x1dfe/0x6df0 [ 123.492728] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 123.493288] ---[ end trace 0000000000000000 ]--- 13:11:03 executing program 1: syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file1\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@mpol={'mpol', 0x3d, {'bind', '', @val={0x3a, [0x2c, 0x30, 0x0]}}}}]}) 13:11:03 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pread64(r0, &(0x7f0000000040)=""/188, 0xbc, 0x400000000000000) 13:11:03 executing program 2: clone(0x13000000, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)="8482b87a0f1c33136bd555121b5a6f8f70acfa2cc77b074ec5ac8789b41e4835cb06f0743e62322ae8eb3c9376140d41650e8092083f3c17f3112084519269b8980d4649965d853f58a8df14362903c78e07a16ce0de0331be12492c0708f16c5d17efb5d8ff96bf2dcae31d1fe0d406c395b13a83c63bb383223264742f10fa98046a27b45c") 13:11:03 executing program 5: setuid(0xee00) prctl$PR_SET_SECUREBITS(0x18, 0x0) 13:11:03 executing program 3: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000040)) ioctl$BTRFS_IOC_DEFRAG(r0, 0x50009402, 0x0) 13:11:03 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r1) keyctl$read(0xb, r0, &(0x7f0000000300)=""/4096, 0x1000) 13:11:03 executing program 3: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000040)) ioctl$BTRFS_IOC_DEFRAG(r0, 0x50009402, 0x0) 13:11:03 executing program 0: r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(0x0, r2, &(0x7f0000000480)=@IORING_OP_ASYNC_CANCEL={0xe, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xff) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x54, &(0x7f0000000300)=@pppol2tpv3}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000300)=ANY=[@ANYBLOB="010003000000000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000180)='./file0\x00', 0x101, 0x1, &(0x7f0000000380)=[{&(0x7f00000001c0)="e6c9d0a24b9e058b9ceec5aec42019f6bddb6301090880b2149201c896a7b8d195ecf0409b3929caac18b72952b484f147e4c8fec2dd2d7a0d684e52fa6d334470d5f03d9121d126aea92c7281051d9aaf715bb53f7c7bd674e0ab6fbf52fd00358747d04fd2465d5d7df50e01cbaf7b0ecd44db236383833dff5439c2d673618e53155112ddfaa36a8e6a12e45b4566c6bfb9e08152f06c1e28fb45b5d73222bda01bdd75fe5d1f8f09f9ea29a6e234ff948bba74efb5bb0f13321d8190808669f3921b8889ac", 0xc7, 0x6}], 0x1800840, &(0x7f00000003c0)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}, {@shortname_win95}, {@utf8}, {@shortname_winnt}, {@shortname_lower}, {@utf8}, {@utf8no}, {@uni_xlate}], [{@euid_lt={'euid<', 0xee01}}, {@subj_user={'subj_user', 0x3d, '/]$'}}]}) io_uring_enter(r0, 0x1, 0x0, 0x0, 0x0, 0x0) r4 = syz_io_uring_setup(0x46ac, &(0x7f0000000080), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f00000003c0)) dup2(r4, r4) [ 123.548367] ======================================================= [ 123.548367] WARNING: The mand mount option has been deprecated and [ 123.548367] and is ignored by this kernel. Remove the mand [ 123.548367] option from the mount to silence this warning. [ 123.548367] ======================================================= [ 123.564629] FAT-fs (loop0): Unrecognized mount option "euid<00000000000000060929" or missing value 13:11:03 executing program 7: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DEL_TX_TS(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x28, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x20000000) syz_genetlink_get_family_id$gtp(&(0x7f0000000540), r1) syz_genetlink_get_family_id$nl80211(&(0x7f0000001040), r1) 13:11:03 executing program 5: write$selinux_attr(0xffffffffffffffff, &(0x7f0000000000)='/usr/sbin/cups-browsed\x00', 0x17) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB], 0x50}}, 0x0) poll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x8440}, {}, {0xffffffffffffffff, 0x20}], 0x3, 0x8) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000000c0), 0x400040, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/bus/mipi-dsi', 0x20200, 0x80) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000003c0)=0x400000) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000240)) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000680)=ANY=[@ANYBLOB="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"]) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) close_range(r0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'netpci0\x00'}) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, 0x0, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x9, 0x0, 0x12, 0x3, 0x0, 0x37, 0xc010, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xdd}, 0x1892, 0xffffffffb76edb1d, 0x200, 0x2, 0x6, 0x0, 0x6, 0x0, 0x8, 0x0, 0x2}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x1) 13:11:03 executing program 3: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000040)) ioctl$BTRFS_IOC_DEFRAG(r0, 0x50009402, 0x0) [ 123.593982] FAT-fs (loop0): Unrecognized mount option "euid<00000000000000060929" or missing value 13:11:03 executing program 6: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x161941, 0x2) r1 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat2(0xffffffffffffffff, 0x0, 0x0, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) epoll_create(0x4) openat(r0, &(0x7f0000000300)='./file1\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000500)={@private}, &(0x7f0000000540)=0xc) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000600)={'ip6gre0\x00', &(0x7f0000000580)={'sit0\x00', 0x0, 0x29, 0x0, 0x8, 0x9, 0x11, @mcast1, @mcast1, 0x700, 0x8, 0x0, 0x6}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./file1\x00', 0x0) 13:11:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0x220) perf_event_open(&(0x7f0000001a80)={0x4, 0x80, 0x9, 0x4, 0x3f, 0x0, 0x0, 0x0, 0x10, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x101, 0xae60}, 0x9240, 0x8a8, 0xa73, 0x5, 0x6, 0xe9b, 0xcc7, 0x0, 0x6, 0x0, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x8) openat(r0, 0x0, 0x100000, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file0/file0\x00'}) listxattr(&(0x7f0000000080)='./file1\x00', &(0x7f0000000300)=""/4096, 0x1000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) write$binfmt_aout(r1, &(0x7f0000001300)={{0xcc, 0x0, 0x52, 0x248, 0x295, 0x5, 0x0, 0x9}, "24f14da56a86b2a113f3cc53ca55bafe991660d1b42188439f2c77c871d17bd6ca9e650fc131bd814bc836be2e", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x74d) [ 123.648611] loop1: detected capacity change from 0 to 40 [ 123.650184] hrtimer: interrupt took 22131 ns 13:11:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0x220) perf_event_open(&(0x7f0000001a80)={0x4, 0x80, 0x9, 0x4, 0x3f, 0x0, 0x0, 0x0, 0x10, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x101, 0xae60}, 0x9240, 0x8a8, 0xa73, 0x5, 0x6, 0xe9b, 0xcc7, 0x0, 0x6, 0x0, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x8) openat(r0, 0x0, 0x100000, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file0/file0\x00'}) listxattr(&(0x7f0000000080)='./file1\x00', &(0x7f0000000300)=""/4096, 0x1000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) write$binfmt_aout(r1, &(0x7f0000001300)={{0xcc, 0x0, 0x52, 0x248, 0x295, 0x5, 0x0, 0x9}, "24f14da56a86b2a113f3cc53ca55bafe991660d1b42188439f2c77c871d17bd6ca9e650fc131bd814bc836be2e", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x74d) 13:11:04 executing program 5: write$selinux_attr(0xffffffffffffffff, &(0x7f0000000000)='/usr/sbin/cups-browsed\x00', 0x17) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB], 0x50}}, 0x0) poll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x8440}, {}, {0xffffffffffffffff, 0x20}], 0x3, 0x8) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000000c0), 0x400040, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/bus/mipi-dsi', 0x20200, 0x80) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000003c0)=0x400000) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000240)) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000680)=ANY=[@ANYBLOB="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"]) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) close_range(r0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'netpci0\x00'}) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, 0x0, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x9, 0x0, 0x12, 0x3, 0x0, 0x37, 0xc010, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xdd}, 0x1892, 0xffffffffb76edb1d, 0x200, 0x2, 0x6, 0x0, 0x6, 0x0, 0x8, 0x0, 0x2}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x1) [ 124.266191] loop1: detected capacity change from 0 to 40 13:11:04 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r1) keyctl$read(0xb, r0, &(0x7f0000000300)=""/4096, 0x1000) 13:11:04 executing program 2: clone(0x13000000, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)="8482b87a0f1c33136bd555121b5a6f8f70acfa2cc77b074ec5ac8789b41e4835cb06f0743e62322ae8eb3c9376140d41650e8092083f3c17f3112084519269b8980d4649965d853f58a8df14362903c78e07a16ce0de0331be12492c0708f16c5d17efb5d8ff96bf2dcae31d1fe0d406c395b13a83c63bb383223264742f10fa98046a27b45c") 13:11:04 executing program 7: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DEL_TX_TS(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x28, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x20000000) syz_genetlink_get_family_id$gtp(&(0x7f0000000540), r1) syz_genetlink_get_family_id$nl80211(&(0x7f0000001040), r1) 13:11:04 executing program 6: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x161941, 0x2) r1 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat2(0xffffffffffffffff, 0x0, 0x0, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) epoll_create(0x4) openat(r0, &(0x7f0000000300)='./file1\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000500)={@private}, &(0x7f0000000540)=0xc) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000600)={'ip6gre0\x00', &(0x7f0000000580)={'sit0\x00', 0x0, 0x29, 0x0, 0x8, 0x9, 0x11, @mcast1, @mcast1, 0x700, 0x8, 0x0, 0x6}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./file1\x00', 0x0) 13:11:04 executing program 3: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DEL_TX_TS(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x28, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x20000000) syz_genetlink_get_family_id$gtp(&(0x7f0000000540), r1) syz_genetlink_get_family_id$nl80211(&(0x7f0000001040), r1) 13:11:04 executing program 0: r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(0x0, r2, &(0x7f0000000480)=@IORING_OP_ASYNC_CANCEL={0xe, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xff) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x54, &(0x7f0000000300)=@pppol2tpv3}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000300)=ANY=[@ANYBLOB="010003000000000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000180)='./file0\x00', 0x101, 0x1, &(0x7f0000000380)=[{&(0x7f00000001c0)="e6c9d0a24b9e058b9ceec5aec42019f6bddb6301090880b2149201c896a7b8d195ecf0409b3929caac18b72952b484f147e4c8fec2dd2d7a0d684e52fa6d334470d5f03d9121d126aea92c7281051d9aaf715bb53f7c7bd674e0ab6fbf52fd00358747d04fd2465d5d7df50e01cbaf7b0ecd44db236383833dff5439c2d673618e53155112ddfaa36a8e6a12e45b4566c6bfb9e08152f06c1e28fb45b5d73222bda01bdd75fe5d1f8f09f9ea29a6e234ff948bba74efb5bb0f13321d8190808669f3921b8889ac", 0xc7, 0x6}], 0x1800840, &(0x7f00000003c0)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}, {@shortname_win95}, {@utf8}, {@shortname_winnt}, {@shortname_lower}, {@utf8}, {@utf8no}, {@uni_xlate}], [{@euid_lt={'euid<', 0xee01}}, {@subj_user={'subj_user', 0x3d, '/]$'}}]}) io_uring_enter(r0, 0x1, 0x0, 0x0, 0x0, 0x0) r4 = syz_io_uring_setup(0x46ac, &(0x7f0000000080), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f00000003c0)) dup2(r4, r4) [ 124.331781] FAT-fs (loop0): Unrecognized mount option "euid<00000000000000060929" or missing value 13:11:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0x220) perf_event_open(&(0x7f0000001a80)={0x4, 0x80, 0x9, 0x4, 0x3f, 0x0, 0x0, 0x0, 0x10, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x101, 0xae60}, 0x9240, 0x8a8, 0xa73, 0x5, 0x6, 0xe9b, 0xcc7, 0x0, 0x6, 0x0, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x8) openat(r0, 0x0, 0x100000, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file0/file0\x00'}) listxattr(&(0x7f0000000080)='./file1\x00', &(0x7f0000000300)=""/4096, 0x1000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) write$binfmt_aout(r1, &(0x7f0000001300)={{0xcc, 0x0, 0x52, 0x248, 0x295, 0x5, 0x0, 0x9}, "24f14da56a86b2a113f3cc53ca55bafe991660d1b42188439f2c77c871d17bd6ca9e650fc131bd814bc836be2e", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x74d) 13:11:04 executing program 0: r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(0x0, r2, &(0x7f0000000480)=@IORING_OP_ASYNC_CANCEL={0xe, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xff) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x54, &(0x7f0000000300)=@pppol2tpv3}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000300)=ANY=[@ANYBLOB="010003000000000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000180)='./file0\x00', 0x101, 0x1, &(0x7f0000000380)=[{&(0x7f00000001c0)="e6c9d0a24b9e058b9ceec5aec42019f6bddb6301090880b2149201c896a7b8d195ecf0409b3929caac18b72952b484f147e4c8fec2dd2d7a0d684e52fa6d334470d5f03d9121d126aea92c7281051d9aaf715bb53f7c7bd674e0ab6fbf52fd00358747d04fd2465d5d7df50e01cbaf7b0ecd44db236383833dff5439c2d673618e53155112ddfaa36a8e6a12e45b4566c6bfb9e08152f06c1e28fb45b5d73222bda01bdd75fe5d1f8f09f9ea29a6e234ff948bba74efb5bb0f13321d8190808669f3921b8889ac", 0xc7, 0x6}], 0x1800840, &(0x7f00000003c0)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}, {@shortname_win95}, {@utf8}, {@shortname_winnt}, {@shortname_lower}, {@utf8}, {@utf8no}, {@uni_xlate}], [{@euid_lt={'euid<', 0xee01}}, {@subj_user={'subj_user', 0x3d, '/]$'}}]}) io_uring_enter(r0, 0x1, 0x0, 0x0, 0x0, 0x0) r4 = syz_io_uring_setup(0x46ac, &(0x7f0000000080), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f00000003c0)) dup2(r4, r4) [ 124.531321] loop1: detected capacity change from 0 to 40 13:11:04 executing program 3: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DEL_TX_TS(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x28, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x20000000) syz_genetlink_get_family_id$gtp(&(0x7f0000000540), r1) syz_genetlink_get_family_id$nl80211(&(0x7f0000001040), r1) 13:11:04 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r1) keyctl$read(0xb, r0, &(0x7f0000000300)=""/4096, 0x1000) [ 124.613805] FAT-fs (loop0): Unrecognized mount option "euid<00000000000000060929" or missing value 13:11:04 executing program 7: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DEL_TX_TS(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x28, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x20000000) syz_genetlink_get_family_id$gtp(&(0x7f0000000540), r1) syz_genetlink_get_family_id$nl80211(&(0x7f0000001040), r1) 13:11:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0x220) perf_event_open(&(0x7f0000001a80)={0x4, 0x80, 0x9, 0x4, 0x3f, 0x0, 0x0, 0x0, 0x10, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x101, 0xae60}, 0x9240, 0x8a8, 0xa73, 0x5, 0x6, 0xe9b, 0xcc7, 0x0, 0x6, 0x0, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x8) openat(r0, 0x0, 0x100000, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file0/file0\x00'}) listxattr(&(0x7f0000000080)='./file1\x00', &(0x7f0000000300)=""/4096, 0x1000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) write$binfmt_aout(r1, &(0x7f0000001300)={{0xcc, 0x0, 0x52, 0x248, 0x295, 0x5, 0x0, 0x9}, "24f14da56a86b2a113f3cc53ca55bafe991660d1b42188439f2c77c871d17bd6ca9e650fc131bd814bc836be2e", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x74d) 13:11:04 executing program 2: r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(0x0, r2, &(0x7f0000000480)=@IORING_OP_ASYNC_CANCEL={0xe, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xff) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x54, &(0x7f0000000300)=@pppol2tpv3}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000300)=ANY=[@ANYBLOB="010003000000000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000180)='./file0\x00', 0x101, 0x1, &(0x7f0000000380)=[{&(0x7f00000001c0)="e6c9d0a24b9e058b9ceec5aec42019f6bddb6301090880b2149201c896a7b8d195ecf0409b3929caac18b72952b484f147e4c8fec2dd2d7a0d684e52fa6d334470d5f03d9121d126aea92c7281051d9aaf715bb53f7c7bd674e0ab6fbf52fd00358747d04fd2465d5d7df50e01cbaf7b0ecd44db236383833dff5439c2d673618e53155112ddfaa36a8e6a12e45b4566c6bfb9e08152f06c1e28fb45b5d73222bda01bdd75fe5d1f8f09f9ea29a6e234ff948bba74efb5bb0f13321d8190808669f3921b8889ac", 0xc7, 0x6}], 0x1800840, &(0x7f00000003c0)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}, {@shortname_win95}, {@utf8}, {@shortname_winnt}, {@shortname_lower}, {@utf8}, {@utf8no}, {@uni_xlate}], [{@euid_lt={'euid<', 0xee01}}, {@subj_user={'subj_user', 0x3d, '/]$'}}]}) io_uring_enter(r0, 0x1, 0x0, 0x0, 0x0, 0x0) r4 = syz_io_uring_setup(0x46ac, &(0x7f0000000080), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f00000003c0)) dup2(r4, r4) 13:11:04 executing program 5: write$selinux_attr(0xffffffffffffffff, &(0x7f0000000000)='/usr/sbin/cups-browsed\x00', 0x17) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB], 0x50}}, 0x0) poll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x8440}, {}, {0xffffffffffffffff, 0x20}], 0x3, 0x8) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000000c0), 0x400040, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/bus/mipi-dsi', 0x20200, 0x80) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000003c0)=0x400000) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000240)) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000680)=ANY=[@ANYBLOB="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"]) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) close_range(r0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'netpci0\x00'}) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, 0x0, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x9, 0x0, 0x12, 0x3, 0x0, 0x37, 0xc010, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xdd}, 0x1892, 0xffffffffb76edb1d, 0x200, 0x2, 0x6, 0x0, 0x6, 0x0, 0x8, 0x0, 0x2}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x1) [ 124.735602] loop1: detected capacity change from 0 to 40 [ 124.749547] FAT-fs (loop2): Unrecognized mount option "euid<00000000000000060929" or missing value 13:11:05 executing program 0: r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(0x0, r2, &(0x7f0000000480)=@IORING_OP_ASYNC_CANCEL={0xe, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xff) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x54, &(0x7f0000000300)=@pppol2tpv3}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000300)=ANY=[@ANYBLOB="010003000000000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000180)='./file0\x00', 0x101, 0x1, &(0x7f0000000380)=[{&(0x7f00000001c0)="e6c9d0a24b9e058b9ceec5aec42019f6bddb6301090880b2149201c896a7b8d195ecf0409b3929caac18b72952b484f147e4c8fec2dd2d7a0d684e52fa6d334470d5f03d9121d126aea92c7281051d9aaf715bb53f7c7bd674e0ab6fbf52fd00358747d04fd2465d5d7df50e01cbaf7b0ecd44db236383833dff5439c2d673618e53155112ddfaa36a8e6a12e45b4566c6bfb9e08152f06c1e28fb45b5d73222bda01bdd75fe5d1f8f09f9ea29a6e234ff948bba74efb5bb0f13321d8190808669f3921b8889ac", 0xc7, 0x6}], 0x1800840, &(0x7f00000003c0)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}, {@shortname_win95}, {@utf8}, {@shortname_winnt}, {@shortname_lower}, {@utf8}, {@utf8no}, {@uni_xlate}], [{@euid_lt={'euid<', 0xee01}}, {@subj_user={'subj_user', 0x3d, '/]$'}}]}) io_uring_enter(r0, 0x1, 0x0, 0x0, 0x0, 0x0) r4 = syz_io_uring_setup(0x46ac, &(0x7f0000000080), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f00000003c0)) dup2(r4, r4) 13:11:05 executing program 7: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DEL_TX_TS(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x28, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x20000000) syz_genetlink_get_family_id$gtp(&(0x7f0000000540), r1) syz_genetlink_get_family_id$nl80211(&(0x7f0000001040), r1) [ 124.982694] FAT-fs (loop0): Unrecognized mount option "euid<00000000000000060929" or missing value 13:11:05 executing program 2: r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(0x0, r2, &(0x7f0000000480)=@IORING_OP_ASYNC_CANCEL={0xe, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xff) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x54, &(0x7f0000000300)=@pppol2tpv3}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000300)=ANY=[@ANYBLOB="010003000000000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000180)='./file0\x00', 0x101, 0x1, &(0x7f0000000380)=[{&(0x7f00000001c0)="e6c9d0a24b9e058b9ceec5aec42019f6bddb6301090880b2149201c896a7b8d195ecf0409b3929caac18b72952b484f147e4c8fec2dd2d7a0d684e52fa6d334470d5f03d9121d126aea92c7281051d9aaf715bb53f7c7bd674e0ab6fbf52fd00358747d04fd2465d5d7df50e01cbaf7b0ecd44db236383833dff5439c2d673618e53155112ddfaa36a8e6a12e45b4566c6bfb9e08152f06c1e28fb45b5d73222bda01bdd75fe5d1f8f09f9ea29a6e234ff948bba74efb5bb0f13321d8190808669f3921b8889ac", 0xc7, 0x6}], 0x1800840, &(0x7f00000003c0)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}, {@shortname_win95}, {@utf8}, {@shortname_winnt}, {@shortname_lower}, {@utf8}, {@utf8no}, {@uni_xlate}], [{@euid_lt={'euid<', 0xee01}}, {@subj_user={'subj_user', 0x3d, '/]$'}}]}) io_uring_enter(r0, 0x1, 0x0, 0x0, 0x0, 0x0) r4 = syz_io_uring_setup(0x46ac, &(0x7f0000000080), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f00000003c0)) dup2(r4, r4) [ 125.053148] FAT-fs (loop2): Unrecognized mount option "euid<00000000000000060929" or missing value 13:11:05 executing program 3: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DEL_TX_TS(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x28, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x20000000) syz_genetlink_get_family_id$gtp(&(0x7f0000000540), r1) syz_genetlink_get_family_id$nl80211(&(0x7f0000001040), r1) 13:11:05 executing program 1: r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(0x0, r2, &(0x7f0000000480)=@IORING_OP_ASYNC_CANCEL={0xe, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xff) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x54, &(0x7f0000000300)=@pppol2tpv3}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000300)=ANY=[@ANYBLOB="010003000000000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000180)='./file0\x00', 0x101, 0x1, &(0x7f0000000380)=[{&(0x7f00000001c0)="e6c9d0a24b9e058b9ceec5aec42019f6bddb6301090880b2149201c896a7b8d195ecf0409b3929caac18b72952b484f147e4c8fec2dd2d7a0d684e52fa6d334470d5f03d9121d126aea92c7281051d9aaf715bb53f7c7bd674e0ab6fbf52fd00358747d04fd2465d5d7df50e01cbaf7b0ecd44db236383833dff5439c2d673618e53155112ddfaa36a8e6a12e45b4566c6bfb9e08152f06c1e28fb45b5d73222bda01bdd75fe5d1f8f09f9ea29a6e234ff948bba74efb5bb0f13321d8190808669f3921b8889ac", 0xc7, 0x6}], 0x1800840, &(0x7f00000003c0)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}, {@shortname_win95}, {@utf8}, {@shortname_winnt}, {@shortname_lower}, {@utf8}, {@utf8no}, {@uni_xlate}], [{@euid_lt={'euid<', 0xee01}}, {@subj_user={'subj_user', 0x3d, '/]$'}}]}) io_uring_enter(r0, 0x1, 0x0, 0x0, 0x0, 0x0) r4 = syz_io_uring_setup(0x46ac, &(0x7f0000000080), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f00000003c0)) dup2(r4, r4) 13:11:05 executing program 2: r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(0x0, r2, &(0x7f0000000480)=@IORING_OP_ASYNC_CANCEL={0xe, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xff) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x54, &(0x7f0000000300)=@pppol2tpv3}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000300)=ANY=[@ANYBLOB="010003000000000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000180)='./file0\x00', 0x101, 0x1, &(0x7f0000000380)=[{&(0x7f00000001c0)="e6c9d0a24b9e058b9ceec5aec42019f6bddb6301090880b2149201c896a7b8d195ecf0409b3929caac18b72952b484f147e4c8fec2dd2d7a0d684e52fa6d334470d5f03d9121d126aea92c7281051d9aaf715bb53f7c7bd674e0ab6fbf52fd00358747d04fd2465d5d7df50e01cbaf7b0ecd44db236383833dff5439c2d673618e53155112ddfaa36a8e6a12e45b4566c6bfb9e08152f06c1e28fb45b5d73222bda01bdd75fe5d1f8f09f9ea29a6e234ff948bba74efb5bb0f13321d8190808669f3921b8889ac", 0xc7, 0x6}], 0x1800840, &(0x7f00000003c0)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}, {@shortname_win95}, {@utf8}, {@shortname_winnt}, {@shortname_lower}, {@utf8}, {@utf8no}, {@uni_xlate}], [{@euid_lt={'euid<', 0xee01}}, {@subj_user={'subj_user', 0x3d, '/]$'}}]}) io_uring_enter(r0, 0x1, 0x0, 0x0, 0x0, 0x0) r4 = syz_io_uring_setup(0x46ac, &(0x7f0000000080), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f00000003c0)) dup2(r4, r4) 13:11:05 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r1) keyctl$read(0xb, r0, &(0x7f0000000300)=""/4096, 0x1000) 13:11:05 executing program 5: write$selinux_attr(0xffffffffffffffff, &(0x7f0000000000)='/usr/sbin/cups-browsed\x00', 0x17) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB], 0x50}}, 0x0) poll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x8440}, {}, {0xffffffffffffffff, 0x20}], 0x3, 0x8) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000000c0), 0x400040, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/bus/mipi-dsi', 0x20200, 0x80) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000003c0)=0x400000) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000240)) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000680)=ANY=[@ANYBLOB="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"]) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) close_range(r0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'netpci0\x00'}) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, 0x0, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x9, 0x0, 0x12, 0x3, 0x0, 0x37, 0xc010, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xdd}, 0x1892, 0xffffffffb76edb1d, 0x200, 0x2, 0x6, 0x0, 0x6, 0x0, 0x8, 0x0, 0x2}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x1) 13:11:05 executing program 0: r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(0x0, r2, &(0x7f0000000480)=@IORING_OP_ASYNC_CANCEL={0xe, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xff) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x54, &(0x7f0000000300)=@pppol2tpv3}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000300)=ANY=[@ANYBLOB="010003000000000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000180)='./file0\x00', 0x101, 0x1, &(0x7f0000000380)=[{&(0x7f00000001c0)="e6c9d0a24b9e058b9ceec5aec42019f6bddb6301090880b2149201c896a7b8d195ecf0409b3929caac18b72952b484f147e4c8fec2dd2d7a0d684e52fa6d334470d5f03d9121d126aea92c7281051d9aaf715bb53f7c7bd674e0ab6fbf52fd00358747d04fd2465d5d7df50e01cbaf7b0ecd44db236383833dff5439c2d673618e53155112ddfaa36a8e6a12e45b4566c6bfb9e08152f06c1e28fb45b5d73222bda01bdd75fe5d1f8f09f9ea29a6e234ff948bba74efb5bb0f13321d8190808669f3921b8889ac", 0xc7, 0x6}], 0x1800840, &(0x7f00000003c0)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}, {@shortname_win95}, {@utf8}, {@shortname_winnt}, {@shortname_lower}, {@utf8}, {@utf8no}, {@uni_xlate}], [{@euid_lt={'euid<', 0xee01}}, {@subj_user={'subj_user', 0x3d, '/]$'}}]}) io_uring_enter(r0, 0x1, 0x0, 0x0, 0x0, 0x0) r4 = syz_io_uring_setup(0x46ac, &(0x7f0000000080), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f00000003c0)) dup2(r4, r4) 13:11:05 executing program 6: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x161941, 0x2) r1 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat2(0xffffffffffffffff, 0x0, 0x0, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) epoll_create(0x4) openat(r0, &(0x7f0000000300)='./file1\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000500)={@private}, &(0x7f0000000540)=0xc) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000600)={'ip6gre0\x00', &(0x7f0000000580)={'sit0\x00', 0x0, 0x29, 0x0, 0x8, 0x9, 0x11, @mcast1, @mcast1, 0x700, 0x8, 0x0, 0x6}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./file1\x00', 0x0) 13:11:05 executing program 7: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x161941, 0x2) r1 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat2(0xffffffffffffffff, 0x0, 0x0, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) epoll_create(0x4) openat(r0, &(0x7f0000000300)='./file1\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000500)={@private}, &(0x7f0000000540)=0xc) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000600)={'ip6gre0\x00', &(0x7f0000000580)={'sit0\x00', 0x0, 0x29, 0x0, 0x8, 0x9, 0x11, @mcast1, @mcast1, 0x700, 0x8, 0x0, 0x6}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./file1\x00', 0x0) [ 125.403674] FAT-fs (loop0): Unrecognized mount option "euid<00000000000000060929" or missing value [ 125.407128] FAT-fs (loop1): Unrecognized mount option "euid<00000000000000060929" or missing value [ 125.409523] FAT-fs (loop2): Unrecognized mount option "euid<00000000000000060929" or missing value 13:11:05 executing program 0: r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(0x0, r2, &(0x7f0000000480)=@IORING_OP_ASYNC_CANCEL={0xe, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xff) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x54, &(0x7f0000000300)=@pppol2tpv3}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000300)=ANY=[@ANYBLOB="010003000000000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000180)='./file0\x00', 0x101, 0x1, &(0x7f0000000380)=[{&(0x7f00000001c0)="e6c9d0a24b9e058b9ceec5aec42019f6bddb6301090880b2149201c896a7b8d195ecf0409b3929caac18b72952b484f147e4c8fec2dd2d7a0d684e52fa6d334470d5f03d9121d126aea92c7281051d9aaf715bb53f7c7bd674e0ab6fbf52fd00358747d04fd2465d5d7df50e01cbaf7b0ecd44db236383833dff5439c2d673618e53155112ddfaa36a8e6a12e45b4566c6bfb9e08152f06c1e28fb45b5d73222bda01bdd75fe5d1f8f09f9ea29a6e234ff948bba74efb5bb0f13321d8190808669f3921b8889ac", 0xc7, 0x6}], 0x1800840, &(0x7f00000003c0)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}, {@shortname_win95}, {@utf8}, {@shortname_winnt}, {@shortname_lower}, {@utf8}, {@utf8no}, {@uni_xlate}], [{@euid_lt={'euid<', 0xee01}}, {@subj_user={'subj_user', 0x3d, '/]$'}}]}) io_uring_enter(r0, 0x1, 0x0, 0x0, 0x0, 0x0) r4 = syz_io_uring_setup(0x46ac, &(0x7f0000000080), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f00000003c0)) dup2(r4, r4) 13:11:05 executing program 1: r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(0x0, r2, &(0x7f0000000480)=@IORING_OP_ASYNC_CANCEL={0xe, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xff) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x54, &(0x7f0000000300)=@pppol2tpv3}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000300)=ANY=[@ANYBLOB="010003000000000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000180)='./file0\x00', 0x101, 0x1, &(0x7f0000000380)=[{&(0x7f00000001c0)="e6c9d0a24b9e058b9ceec5aec42019f6bddb6301090880b2149201c896a7b8d195ecf0409b3929caac18b72952b484f147e4c8fec2dd2d7a0d684e52fa6d334470d5f03d9121d126aea92c7281051d9aaf715bb53f7c7bd674e0ab6fbf52fd00358747d04fd2465d5d7df50e01cbaf7b0ecd44db236383833dff5439c2d673618e53155112ddfaa36a8e6a12e45b4566c6bfb9e08152f06c1e28fb45b5d73222bda01bdd75fe5d1f8f09f9ea29a6e234ff948bba74efb5bb0f13321d8190808669f3921b8889ac", 0xc7, 0x6}], 0x1800840, &(0x7f00000003c0)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}, {@shortname_win95}, {@utf8}, {@shortname_winnt}, {@shortname_lower}, {@utf8}, {@utf8no}, {@uni_xlate}], [{@euid_lt={'euid<', 0xee01}}, {@subj_user={'subj_user', 0x3d, '/]$'}}]}) io_uring_enter(r0, 0x1, 0x0, 0x0, 0x0, 0x0) r4 = syz_io_uring_setup(0x46ac, &(0x7f0000000080), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f00000003c0)) dup2(r4, r4) [ 125.656028] FAT-fs (loop0): Unrecognized mount option "euid<00000000000000060929" or missing value 13:11:05 executing program 6: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x161941, 0x2) r1 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat2(0xffffffffffffffff, 0x0, 0x0, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) epoll_create(0x4) openat(r0, &(0x7f0000000300)='./file1\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000500)={@private}, &(0x7f0000000540)=0xc) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000600)={'ip6gre0\x00', &(0x7f0000000580)={'sit0\x00', 0x0, 0x29, 0x0, 0x8, 0x9, 0x11, @mcast1, @mcast1, 0x700, 0x8, 0x0, 0x6}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./file1\x00', 0x0) [ 125.680511] FAT-fs (loop1): Unrecognized mount option "euid<00000000000000060929" or missing value 13:11:06 executing program 7: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x161941, 0x2) r1 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat2(0xffffffffffffffff, 0x0, 0x0, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) epoll_create(0x4) openat(r0, &(0x7f0000000300)='./file1\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000500)={@private}, &(0x7f0000000540)=0xc) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000600)={'ip6gre0\x00', &(0x7f0000000580)={'sit0\x00', 0x0, 0x29, 0x0, 0x8, 0x9, 0x11, @mcast1, @mcast1, 0x700, 0x8, 0x0, 0x6}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./file1\x00', 0x0) 13:11:06 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0x220) perf_event_open(&(0x7f0000001a80)={0x4, 0x80, 0x9, 0x4, 0x3f, 0x0, 0x0, 0x0, 0x10, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x101, 0xae60}, 0x9240, 0x8a8, 0xa73, 0x5, 0x6, 0xe9b, 0xcc7, 0x0, 0x6, 0x0, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x8) openat(r0, 0x0, 0x100000, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file0/file0\x00'}) listxattr(&(0x7f0000000080)='./file1\x00', &(0x7f0000000300)=""/4096, 0x1000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) write$binfmt_aout(r1, &(0x7f0000001300)={{0xcc, 0x0, 0x52, 0x248, 0x295, 0x5, 0x0, 0x9}, "24f14da56a86b2a113f3cc53ca55bafe991660d1b42188439f2c77c871d17bd6ca9e650fc131bd814bc836be2e", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x74d) 13:11:06 executing program 0: r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(0x0, r2, &(0x7f0000000480)=@IORING_OP_ASYNC_CANCEL={0xe, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xff) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x54, &(0x7f0000000300)=@pppol2tpv3}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000300)=ANY=[@ANYBLOB="010003000000000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000180)='./file0\x00', 0x101, 0x1, &(0x7f0000000380)=[{&(0x7f00000001c0)="e6c9d0a24b9e058b9ceec5aec42019f6bddb6301090880b2149201c896a7b8d195ecf0409b3929caac18b72952b484f147e4c8fec2dd2d7a0d684e52fa6d334470d5f03d9121d126aea92c7281051d9aaf715bb53f7c7bd674e0ab6fbf52fd00358747d04fd2465d5d7df50e01cbaf7b0ecd44db236383833dff5439c2d673618e53155112ddfaa36a8e6a12e45b4566c6bfb9e08152f06c1e28fb45b5d73222bda01bdd75fe5d1f8f09f9ea29a6e234ff948bba74efb5bb0f13321d8190808669f3921b8889ac", 0xc7, 0x6}], 0x1800840, &(0x7f00000003c0)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}, {@shortname_win95}, {@utf8}, {@shortname_winnt}, {@shortname_lower}, {@utf8}, {@utf8no}, {@uni_xlate}], [{@euid_lt={'euid<', 0xee01}}, {@subj_user={'subj_user', 0x3d, '/]$'}}]}) io_uring_enter(r0, 0x1, 0x0, 0x0, 0x0, 0x0) r4 = syz_io_uring_setup(0x46ac, &(0x7f0000000080), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f00000003c0)) dup2(r4, r4) 13:11:06 executing program 1: r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(0x0, r2, &(0x7f0000000480)=@IORING_OP_ASYNC_CANCEL={0xe, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xff) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x54, &(0x7f0000000300)=@pppol2tpv3}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000300)=ANY=[@ANYBLOB="010003000000000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000180)='./file0\x00', 0x101, 0x1, &(0x7f0000000380)=[{&(0x7f00000001c0)="e6c9d0a24b9e058b9ceec5aec42019f6bddb6301090880b2149201c896a7b8d195ecf0409b3929caac18b72952b484f147e4c8fec2dd2d7a0d684e52fa6d334470d5f03d9121d126aea92c7281051d9aaf715bb53f7c7bd674e0ab6fbf52fd00358747d04fd2465d5d7df50e01cbaf7b0ecd44db236383833dff5439c2d673618e53155112ddfaa36a8e6a12e45b4566c6bfb9e08152f06c1e28fb45b5d73222bda01bdd75fe5d1f8f09f9ea29a6e234ff948bba74efb5bb0f13321d8190808669f3921b8889ac", 0xc7, 0x6}], 0x1800840, &(0x7f00000003c0)={[{@iocharset={'iocharset', 0x3d, 'cp860'}}, {@shortname_win95}, {@utf8}, {@shortname_winnt}, {@shortname_lower}, {@utf8}, {@utf8no}, {@uni_xlate}], [{@euid_lt={'euid<', 0xee01}}, {@subj_user={'subj_user', 0x3d, '/]$'}}]}) io_uring_enter(r0, 0x1, 0x0, 0x0, 0x0, 0x0) r4 = syz_io_uring_setup(0x46ac, &(0x7f0000000080), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f00000003c0)) dup2(r4, r4) 13:11:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0x220) perf_event_open(&(0x7f0000001a80)={0x4, 0x80, 0x9, 0x4, 0x3f, 0x0, 0x0, 0x0, 0x10, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x101, 0xae60}, 0x9240, 0x8a8, 0xa73, 0x5, 0x6, 0xe9b, 0xcc7, 0x0, 0x6, 0x0, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x8) openat(r0, 0x0, 0x100000, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file0/file0\x00'}) listxattr(&(0x7f0000000080)='./file1\x00', &(0x7f0000000300)=""/4096, 0x1000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) write$binfmt_aout(r1, &(0x7f0000001300)={{0xcc, 0x0, 0x52, 0x248, 0x295, 0x5, 0x0, 0x9}, "24f14da56a86b2a113f3cc53ca55bafe991660d1b42188439f2c77c871d17bd6ca9e650fc131bd814bc836be2e", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x74d) 13:11:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0x220) perf_event_open(&(0x7f0000001a80)={0x4, 0x80, 0x9, 0x4, 0x3f, 0x0, 0x0, 0x0, 0x10, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x101, 0xae60}, 0x9240, 0x8a8, 0xa73, 0x5, 0x6, 0xe9b, 0xcc7, 0x0, 0x6, 0x0, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x8) openat(r0, 0x0, 0x100000, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file0/file0\x00'}) listxattr(&(0x7f0000000080)='./file1\x00', &(0x7f0000000300)=""/4096, 0x1000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) write$binfmt_aout(r1, &(0x7f0000001300)={{0xcc, 0x0, 0x52, 0x248, 0x295, 0x5, 0x0, 0x9}, "24f14da56a86b2a113f3cc53ca55bafe991660d1b42188439f2c77c871d17bd6ca9e650fc131bd814bc836be2e", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x74d) 13:11:06 executing program 2: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x161941, 0x2) r1 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat2(0xffffffffffffffff, 0x0, 0x0, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) epoll_create(0x4) openat(r0, &(0x7f0000000300)='./file1\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000500)={@private}, &(0x7f0000000540)=0xc) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000600)={'ip6gre0\x00', &(0x7f0000000580)={'sit0\x00', 0x0, 0x29, 0x0, 0x8, 0x9, 0x11, @mcast1, @mcast1, 0x700, 0x8, 0x0, 0x6}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./file1\x00', 0x0) [ 125.874228] loop3: detected capacity change from 0 to 40 [ 125.880681] loop6: detected capacity change from 0 to 40 [ 125.882682] loop4: detected capacity change from 0 to 40 [ 125.889054] FAT-fs (loop0): Unrecognized mount option "euid<00000000000000060929" or missing value [ 125.893770] FAT-fs (loop1): Unrecognized mount option "euid<00000000000000060929" or missing value 13:11:06 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r1) keyctl$read(0xb, r0, &(0x7f0000000300)=""/4096, 0x1000) 13:11:06 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0x220) perf_event_open(&(0x7f0000001a80)={0x4, 0x80, 0x9, 0x4, 0x3f, 0x0, 0x0, 0x0, 0x10, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x101, 0xae60}, 0x9240, 0x8a8, 0xa73, 0x5, 0x6, 0xe9b, 0xcc7, 0x0, 0x6, 0x0, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x8) openat(r0, 0x0, 0x100000, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file0/file0\x00'}) listxattr(&(0x7f0000000080)='./file1\x00', &(0x7f0000000300)=""/4096, 0x1000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) write$binfmt_aout(r1, &(0x7f0000001300)={{0xcc, 0x0, 0x52, 0x248, 0x295, 0x5, 0x0, 0x9}, "24f14da56a86b2a113f3cc53ca55bafe991660d1b42188439f2c77c871d17bd6ca9e650fc131bd814bc836be2e", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x74d) 13:11:06 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r1) keyctl$read(0xb, r0, &(0x7f0000000300)=""/4096, 0x1000) [ 126.001970] loop6: detected capacity change from 0 to 40 13:11:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0x220) perf_event_open(&(0x7f0000001a80)={0x4, 0x80, 0x9, 0x4, 0x3f, 0x0, 0x0, 0x0, 0x10, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x101, 0xae60}, 0x9240, 0x8a8, 0xa73, 0x5, 0x6, 0xe9b, 0xcc7, 0x0, 0x6, 0x0, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x8) openat(r0, 0x0, 0x100000, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file0/file0\x00'}) listxattr(&(0x7f0000000080)='./file1\x00', &(0x7f0000000300)=""/4096, 0x1000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) write$binfmt_aout(r1, &(0x7f0000001300)={{0xcc, 0x0, 0x52, 0x248, 0x295, 0x5, 0x0, 0x9}, "24f14da56a86b2a113f3cc53ca55bafe991660d1b42188439f2c77c871d17bd6ca9e650fc131bd814bc836be2e", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x74d) 13:11:06 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0x220) perf_event_open(&(0x7f0000001a80)={0x4, 0x80, 0x9, 0x4, 0x3f, 0x0, 0x0, 0x0, 0x10, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x101, 0xae60}, 0x9240, 0x8a8, 0xa73, 0x5, 0x6, 0xe9b, 0xcc7, 0x0, 0x6, 0x0, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x8) openat(r0, 0x0, 0x100000, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file0/file0\x00'}) listxattr(&(0x7f0000000080)='./file1\x00', &(0x7f0000000300)=""/4096, 0x1000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) write$binfmt_aout(r1, &(0x7f0000001300)={{0xcc, 0x0, 0x52, 0x248, 0x295, 0x5, 0x0, 0x9}, "24f14da56a86b2a113f3cc53ca55bafe991660d1b42188439f2c77c871d17bd6ca9e650fc131bd814bc836be2e", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x74d) 13:11:06 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r1) keyctl$read(0xb, r0, &(0x7f0000000300)=""/4096, 0x1000) [ 126.070769] loop3: detected capacity change from 0 to 40 [ 126.081561] loop6: detected capacity change from 0 to 40 13:11:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0x220) perf_event_open(&(0x7f0000001a80)={0x4, 0x80, 0x9, 0x4, 0x3f, 0x0, 0x0, 0x0, 0x10, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x101, 0xae60}, 0x9240, 0x8a8, 0xa73, 0x5, 0x6, 0xe9b, 0xcc7, 0x0, 0x6, 0x0, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x8) openat(r0, 0x0, 0x100000, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file0/file0\x00'}) listxattr(&(0x7f0000000080)='./file1\x00', &(0x7f0000000300)=""/4096, 0x1000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) write$binfmt_aout(r1, &(0x7f0000001300)={{0xcc, 0x0, 0x52, 0x248, 0x295, 0x5, 0x0, 0x9}, "24f14da56a86b2a113f3cc53ca55bafe991660d1b42188439f2c77c871d17bd6ca9e650fc131bd814bc836be2e", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x74d) 13:11:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0x220) perf_event_open(&(0x7f0000001a80)={0x4, 0x80, 0x9, 0x4, 0x3f, 0x0, 0x0, 0x0, 0x10, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x101, 0xae60}, 0x9240, 0x8a8, 0xa73, 0x5, 0x6, 0xe9b, 0xcc7, 0x0, 0x6, 0x0, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x8) openat(r0, 0x0, 0x100000, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file0/file0\x00'}) listxattr(&(0x7f0000000080)='./file1\x00', &(0x7f0000000300)=""/4096, 0x1000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) write$binfmt_aout(r1, &(0x7f0000001300)={{0xcc, 0x0, 0x52, 0x248, 0x295, 0x5, 0x0, 0x9}, "24f14da56a86b2a113f3cc53ca55bafe991660d1b42188439f2c77c871d17bd6ca9e650fc131bd814bc836be2e", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x74d) 13:11:06 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r1) keyctl$read(0xb, r0, &(0x7f0000000300)=""/4096, 0x1000) [ 126.153408] loop4: detected capacity change from 0 to 40 [ 126.364690] loop3: detected capacity change from 0 to 40 [ 126.650101] syz-executor.5 (4235) used greatest stack depth: 24472 bytes left 13:11:06 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r1) keyctl$read(0xb, r0, &(0x7f0000000300)=""/4096, 0x1000) 13:11:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0x220) perf_event_open(&(0x7f0000001a80)={0x4, 0x80, 0x9, 0x4, 0x3f, 0x0, 0x0, 0x0, 0x10, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x101, 0xae60}, 0x9240, 0x8a8, 0xa73, 0x5, 0x6, 0xe9b, 0xcc7, 0x0, 0x6, 0x0, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x8) openat(r0, 0x0, 0x100000, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file0/file0\x00'}) listxattr(&(0x7f0000000080)='./file1\x00', &(0x7f0000000300)=""/4096, 0x1000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) write$binfmt_aout(r1, &(0x7f0000001300)={{0xcc, 0x0, 0x52, 0x248, 0x295, 0x5, 0x0, 0x9}, "24f14da56a86b2a113f3cc53ca55bafe991660d1b42188439f2c77c871d17bd6ca9e650fc131bd814bc836be2e", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x74d) 13:11:06 executing program 7: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x161941, 0x2) r1 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat2(0xffffffffffffffff, 0x0, 0x0, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) epoll_create(0x4) openat(r0, &(0x7f0000000300)='./file1\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000500)={@private}, &(0x7f0000000540)=0xc) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000600)={'ip6gre0\x00', &(0x7f0000000580)={'sit0\x00', 0x0, 0x29, 0x0, 0x8, 0x9, 0x11, @mcast1, @mcast1, 0x700, 0x8, 0x0, 0x6}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./file1\x00', 0x0) 13:11:06 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r1) keyctl$read(0xb, r0, &(0x7f0000000300)=""/4096, 0x1000) 13:11:06 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r1) keyctl$read(0xb, r0, &(0x7f0000000300)=""/4096, 0x1000) 13:11:06 executing program 3: write$selinux_attr(0xffffffffffffffff, &(0x7f0000000000)='/usr/sbin/cups-browsed\x00', 0x17) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB], 0x50}}, 0x0) poll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x8440}, {}, {0xffffffffffffffff, 0x20}], 0x3, 0x8) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000000c0), 0x400040, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/bus/mipi-dsi', 0x20200, 0x80) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000003c0)=0x400000) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000240)) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000680)=ANY=[@ANYBLOB="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"]) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) close_range(r0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'netpci0\x00'}) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, 0x0, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x9, 0x0, 0x12, 0x3, 0x0, 0x37, 0xc010, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xdd}, 0x1892, 0xffffffffb76edb1d, 0x200, 0x2, 0x6, 0x0, 0x6, 0x0, 0x8, 0x0, 0x2}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x1) 13:11:06 executing program 2: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x161941, 0x2) r1 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat2(0xffffffffffffffff, 0x0, 0x0, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) epoll_create(0x4) openat(r0, &(0x7f0000000300)='./file1\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000500)={@private}, &(0x7f0000000540)=0xc) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000600)={'ip6gre0\x00', &(0x7f0000000580)={'sit0\x00', 0x0, 0x29, 0x0, 0x8, 0x9, 0x11, @mcast1, @mcast1, 0x700, 0x8, 0x0, 0x6}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./file1\x00', 0x0) [ 126.726305] loop4: detected capacity change from 0 to 40 13:11:06 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r1) keyctl$read(0xb, r0, &(0x7f0000000300)=""/4096, 0x1000) 13:11:06 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='devpts\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x8cffffff}}]}) 13:11:06 executing program 2: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x161941, 0x2) r1 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat2(0xffffffffffffffff, 0x0, 0x0, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) epoll_create(0x4) openat(r0, &(0x7f0000000300)='./file1\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000500)={@private}, &(0x7f0000000540)=0xc) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000600)={'ip6gre0\x00', &(0x7f0000000580)={'sit0\x00', 0x0, 0x29, 0x0, 0x8, 0x9, 0x11, @mcast1, @mcast1, 0x700, 0x8, 0x0, 0x6}}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./file1\x00', 0x0) 13:11:07 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r1) keyctl$read(0xb, r0, &(0x7f0000000300)=""/4096, 0x1000) 13:11:07 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r1) keyctl$read(0xb, r0, &(0x7f0000000300)=""/4096, 0x1000) 13:11:07 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r1) keyctl$read(0xb, r0, &(0x7f0000000300)=""/4096, 0x1000) 13:11:07 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='devpts\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x8cffffff}}]}) 13:11:07 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r1) keyctl$read(0xb, r0, &(0x7f0000000300)=""/4096, 0x1000) 13:11:07 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='devpts\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x8cffffff}}]}) 13:11:07 executing program 3: write$selinux_attr(0xffffffffffffffff, &(0x7f0000000000)='/usr/sbin/cups-browsed\x00', 0x17) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB], 0x50}}, 0x0) poll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x8440}, {}, {0xffffffffffffffff, 0x20}], 0x3, 0x8) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000000c0), 0x400040, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/bus/mipi-dsi', 0x20200, 0x80) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000003c0)=0x400000) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000240)) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000680)=ANY=[@ANYBLOB="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"]) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) close_range(r0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'netpci0\x00'}) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, 0x0, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x9, 0x0, 0x12, 0x3, 0x0, 0x37, 0xc010, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xdd}, 0x1892, 0xffffffffb76edb1d, 0x200, 0x2, 0x6, 0x0, 0x6, 0x0, 0x8, 0x0, 0x2}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x1) 13:11:07 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='devpts\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x8cffffff}}]}) 13:11:07 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r1, 0x301, 0x0, 0x0, {0x4}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) socket$nl_audit(0x10, 0x3, 0x9) 13:11:07 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x9, &(0x7f0000000200)={0x77359400}, 0x10) 13:11:07 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r1, 0x323}, 0x14}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040), r0) 13:11:07 executing program 6: syz_emit_ethernet(0xbe, &(0x7f0000000040)={@link_local, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x29, 0x0, @private=0x9c, @local}, {0x0, 0x0, 0x9c, 0x0, @wg=@initiation={0x220, 0x9c02, "9cdf3f090000000051710000000000000000000000002200", "117ad553083cf29887cf5f29c7a6c95c7558a7482e05b26986482338c4a4807a788dafc8181760316d293733eea7f8d3", "a75e81563131a3cfe7a7f5a39f877d4c3d74923d6412b791b7128fae", {"452bd88da6fe3cce2e1d7da77bb012ba", "e313e602785b0268a2ed03bd928c6509"}}}}}}}, 0x0) [ 127.109477] sit: Src spoofed 0.0.0.156/2002:0:29c:0:9cdf:3f09:: -> 172.20.20.170/5171::2200 [ 127.110970] sit: Src spoofed 0.0.0.156/2002:0:29c:0:9cdf:3f09:: -> 172.20.20.170/5171::2200 13:11:07 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000180)={{{@in=@private, @in=@multicast1}}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x0, @in6=@mcast2}}, 0xe8) 13:11:07 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='devpts\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x8cffffff}}]}) 13:11:07 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x9, &(0x7f0000000200)={0x77359400}, 0x10) 13:11:07 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r1, 0x323}, 0x14}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040), r0) 13:11:07 executing program 6: syz_emit_ethernet(0xbe, &(0x7f0000000040)={@link_local, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x29, 0x0, @private=0x9c, @local}, {0x0, 0x0, 0x9c, 0x0, @wg=@initiation={0x220, 0x9c02, "9cdf3f090000000051710000000000000000000000002200", "117ad553083cf29887cf5f29c7a6c95c7558a7482e05b26986482338c4a4807a788dafc8181760316d293733eea7f8d3", "a75e81563131a3cfe7a7f5a39f877d4c3d74923d6412b791b7128fae", {"452bd88da6fe3cce2e1d7da77bb012ba", "e313e602785b0268a2ed03bd928c6509"}}}}}}}, 0x0) 13:11:07 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='devpts\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x8cffffff}}]}) 13:11:07 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000180)={{{@in=@private, @in=@multicast1}}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x0, @in6=@mcast2}}, 0xe8) [ 127.226719] sit: Src spoofed 0.0.0.156/2002:0:29c:0:9cdf:3f09:: -> 172.20.20.170/5171::2200 13:11:07 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x9, &(0x7f0000000200)={0x77359400}, 0x10) 13:11:07 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000180)={{{@in=@private, @in=@multicast1}}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x0, @in6=@mcast2}}, 0xe8) 13:11:07 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='devpts\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x8cffffff}}]}) 13:11:07 executing program 6: syz_emit_ethernet(0xbe, &(0x7f0000000040)={@link_local, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x29, 0x0, @private=0x9c, @local}, {0x0, 0x0, 0x9c, 0x0, @wg=@initiation={0x220, 0x9c02, "9cdf3f090000000051710000000000000000000000002200", "117ad553083cf29887cf5f29c7a6c95c7558a7482e05b26986482338c4a4807a788dafc8181760316d293733eea7f8d3", "a75e81563131a3cfe7a7f5a39f877d4c3d74923d6412b791b7128fae", {"452bd88da6fe3cce2e1d7da77bb012ba", "e313e602785b0268a2ed03bd928c6509"}}}}}}}, 0x0) [ 127.422263] sit: Src spoofed 0.0.0.156/2002:0:29c:0:9cdf:3f09:: -> 172.20.20.170/5171::2200 13:11:07 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r1, 0x301, 0x0, 0x0, {0x4}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) socket$nl_audit(0x10, 0x3, 0x9) 13:11:07 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r1, 0x323}, 0x14}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040), r0) 13:11:07 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x9, &(0x7f0000000200)={0x77359400}, 0x10) 13:11:07 executing program 3: write$selinux_attr(0xffffffffffffffff, &(0x7f0000000000)='/usr/sbin/cups-browsed\x00', 0x17) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB], 0x50}}, 0x0) poll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x8440}, {}, {0xffffffffffffffff, 0x20}], 0x3, 0x8) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000000c0), 0x400040, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/bus/mipi-dsi', 0x20200, 0x80) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000003c0)=0x400000) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000240)) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000680)=ANY=[@ANYBLOB="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"]) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) close_range(r0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'netpci0\x00'}) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, 0x0, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x9, 0x0, 0x12, 0x3, 0x0, 0x37, 0xc010, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xdd}, 0x1892, 0xffffffffb76edb1d, 0x200, 0x2, 0x6, 0x0, 0x6, 0x0, 0x8, 0x0, 0x2}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x1) 13:11:07 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r1, 0x323}, 0x14}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040), r0) 13:11:07 executing program 6: syz_emit_ethernet(0xbe, &(0x7f0000000040)={@link_local, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x29, 0x0, @private=0x9c, @local}, {0x0, 0x0, 0x9c, 0x0, @wg=@initiation={0x220, 0x9c02, "9cdf3f090000000051710000000000000000000000002200", "117ad553083cf29887cf5f29c7a6c95c7558a7482e05b26986482338c4a4807a788dafc8181760316d293733eea7f8d3", "a75e81563131a3cfe7a7f5a39f877d4c3d74923d6412b791b7128fae", {"452bd88da6fe3cce2e1d7da77bb012ba", "e313e602785b0268a2ed03bd928c6509"}}}}}}}, 0x0) 13:11:07 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r1, 0x323}, 0x14}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040), r0) 13:11:07 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r1, 0x323}, 0x14}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040), r0) 13:11:07 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000180)={{{@in=@private, @in=@multicast1}}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x0, @in6=@mcast2}}, 0xe8) [ 127.516907] sit: Src spoofed 0.0.0.156/2002:0:29c:0:9cdf:3f09:: -> 172.20.20.170/5171::2200 13:11:07 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r1, 0x301, 0x0, 0x0, {0x4}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) socket$nl_audit(0x10, 0x3, 0x9) 13:11:07 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r1, 0x301, 0x0, 0x0, {0x4}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) socket$nl_audit(0x10, 0x3, 0x9) 13:11:07 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r1, 0x301, 0x0, 0x0, {0x4}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) socket$nl_audit(0x10, 0x3, 0x9) 13:11:07 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r1, 0x301, 0x0, 0x0, {0x4}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) socket$nl_audit(0x10, 0x3, 0x9) 13:11:07 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r1, 0x301, 0x0, 0x0, {0x4}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) socket$nl_audit(0x10, 0x3, 0x9) 13:11:07 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r1, 0x301, 0x0, 0x0, {0x4}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) socket$nl_audit(0x10, 0x3, 0x9) 13:11:07 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r1, 0x323}, 0x14}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040), r0) 13:11:08 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r1, 0x301, 0x0, 0x0, {0x4}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) socket$nl_audit(0x10, 0x3, 0x9) 13:11:08 executing program 2: r0 = getpid() r1 = memfd_create(&(0x7f0000000280)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x05\x00\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\xff#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x04\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf27x!N;\xb5x\t\xa4E\xbe\x93r\x04\a\x00\x00\x00\x00\x00\x00\x00\"\xa1\xd8\x06>\xc9\xe2\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\x01\x01\x00\x00\x00\x00\x00\x00\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/\\\x01\xe2\xba\x0e\xe3\xf95\x1d\x10\xa7\x97\xbf\x8e\xac\x81\xc9\x13\x8e\xb3\xf3\xb5d\xa1\xcf\x1d\x92\x9b\x9b\xa7\x12F\xa0\xe0\xff\x1a\x8e\xe2ae^=\n\xe1\xa6\xb8\xe9v\x8f2\xf4\xac\xe5\xdf\xffi`Mo\x1e\x1cMN<\x1b\xd8\xfe\xd6P\xcdQ\x83\xfa\xe7\x1d\xd5\x01n\xa7~\x8b\x90/62\xff;.S\xf7\x0flwa\x16\xf0\xf2(\x96V,\xd7s\xaaOE\xd3H\xfd`}\xd8\xbc\x9a\xca\xe3\n\xd7fCe\xd8\xbb\xdao\xb0\x85\xcc\xedv\x94\xb5\xc4\xb6[>\xb9,\xfch_-s\x94,F\x15\xd8m5>\x94\x84\xf5\x00\xc3\xf6m\xc7B\t{\xe0d\xc65(\x18\x9c\xad\x13b6\xca\x16\x95\xcb^zF\xd0\x1a\x8dP\x94\x19\xa4\xbfr=\xb6\xae0D\'e7p\xe6\fI\xdd\x12\x82\xc4\x8ax\xe5d\xfe\x9a\x1b\xa6\v\xc9\x151\x0f\xdf\bq\xb6 n\xc5\xd1\xa2\xac]\xa4w6\xf5=\x97f\xdd\x91_\xf8?Kr', 0x7) ftruncate(r1, 0x2000000) finit_module(r1, 0x0, 0x0) ioprio_set$pid(0x5, r0, 0x4000) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)) 13:11:08 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r1, 0x301, 0x0, 0x0, {0x4}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) socket$nl_audit(0x10, 0x3, 0x9) 13:11:08 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf VM DIAGNOSIS: 13:11:03 Registers: info registers vcpu 0 RAX=0000000000000065 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822b25c1 RDI=ffffffff8763fae0 RBP=ffffffff8763faa0 RSP=ffff88803fb4f698 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000065 R11=0000000000000001 R12=0000000000000065 R13=ffffffff8763faa0 R14=0000000000000010 R15=ffffffff822b25b0 RIP=ffffffff822b2619 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f93f3ce3700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f93f6881018 CR3=0000000008c00000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007f93f68547c0 00007f93f68547c8 YMM02=0000000000000000 0000000000000000 00007f93f68547e0 00007f93f68547c0 YMM03=0000000000000000 0000000000000000 00007f93f68547c8 00007f93f68547c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000000 RBX=0000000000000001 RCX=ffffffff84262937 RDX=ffffed100d9c6f99 RSI=0000000000000004 RDI=ffff88806ce37cc0 RBP=ffff88806ce37cc0 RSP=ffff88803fbffa98 R8 =0000000000000000 R9 =ffff88806ce37cc3 R10=ffffed100d9c6f98 R11=0000000000000001 R12=0000000000000003 R13=ffffed100d9c6f98 R14=0000000000000001 R15=1ffff11007f7ff54 RIP=ffffffff842629b4 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00005555556f7400 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00005555556f8c18 CR3=0000000034a06000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007f7b035737c0 00007f7b035737c8 YMM02=0000000000000000 0000000000000000 00007f7b035737e0 00007f7b035737c0 YMM03=0000000000000000 0000000000000000 00007f7b035737c8 00007f7b035737c0 YMM04=0000000000000000 0000000000000000 8f6f5a1b1255d56b 13331c0f7ab88284 YMM05=0000000000000000 0000000000000000 5cb4276a0498fa10 2f7464322283b33b YMM06=0000000000000000 0000000000000000 c6833ab195c306d4 e01f1de3ca2dbf96 YMM07=0000000000000000 0000000000000000 ffd8b5ef175d6cf1 08072c4912be3103 YMM08=0000000000000000 0000000000000000 dee06ca1078ec703 293614dfa8583f85 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000