Warning: Permanently added '[localhost]:9609' (ECDSA) to the list of known hosts. 2022/08/19 01:40:06 fuzzer started 2022/08/19 01:40:07 dialing manager at localhost:45521 syzkaller login: [ 35.712826] cgroup: Unknown subsys name 'net' [ 35.778888] cgroup: Unknown subsys name 'rlimit' 2022/08/19 01:40:21 syscalls: 2215 2022/08/19 01:40:21 code coverage: enabled 2022/08/19 01:40:21 comparison tracing: enabled 2022/08/19 01:40:21 extra coverage: enabled 2022/08/19 01:40:21 setuid sandbox: enabled 2022/08/19 01:40:21 namespace sandbox: enabled 2022/08/19 01:40:21 Android sandbox: enabled 2022/08/19 01:40:21 fault injection: enabled 2022/08/19 01:40:21 leak checking: enabled 2022/08/19 01:40:21 net packet injection: enabled 2022/08/19 01:40:21 net device setup: enabled 2022/08/19 01:40:21 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/08/19 01:40:21 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/08/19 01:40:21 USB emulation: enabled 2022/08/19 01:40:21 hci packet injection: enabled 2022/08/19 01:40:21 wifi device emulation: failed to parse kernel version (6.0.0-rc1-next-20220818) 2022/08/19 01:40:21 802.15.4 emulation: enabled 2022/08/19 01:40:21 fetching corpus: 50, signal 26208/28035 (executing program) 2022/08/19 01:40:22 fetching corpus: 100, signal 40817/44352 (executing program) 2022/08/19 01:40:22 fetching corpus: 150, signal 55740/60828 (executing program) 2022/08/19 01:40:22 fetching corpus: 200, signal 68278/74798 (executing program) 2022/08/19 01:40:22 fetching corpus: 250, signal 73446/81462 (executing program) 2022/08/19 01:40:22 fetching corpus: 300, signal 78018/87468 (executing program) 2022/08/19 01:40:22 fetching corpus: 350, signal 84844/95599 (executing program) 2022/08/19 01:40:22 fetching corpus: 400, signal 89443/101586 (executing program) 2022/08/19 01:40:23 fetching corpus: 450, signal 93554/106992 (executing program) 2022/08/19 01:40:23 fetching corpus: 500, signal 98969/113562 (executing program) 2022/08/19 01:40:23 fetching corpus: 550, signal 103329/119155 (executing program) 2022/08/19 01:40:23 fetching corpus: 600, signal 107162/124129 (executing program) 2022/08/19 01:40:23 fetching corpus: 650, signal 111011/129091 (executing program) 2022/08/19 01:40:23 fetching corpus: 700, signal 115532/134627 (executing program) 2022/08/19 01:40:24 fetching corpus: 750, signal 118463/138711 (executing program) 2022/08/19 01:40:24 fetching corpus: 800, signal 121240/142608 (executing program) 2022/08/19 01:40:24 fetching corpus: 850, signal 123486/146035 (executing program) 2022/08/19 01:40:24 fetching corpus: 900, signal 126266/149884 (executing program) 2022/08/19 01:40:24 fetching corpus: 950, signal 128691/153394 (executing program) 2022/08/19 01:40:24 fetching corpus: 1000, signal 131356/157053 (executing program) 2022/08/19 01:40:24 fetching corpus: 1050, signal 133810/160534 (executing program) 2022/08/19 01:40:24 fetching corpus: 1100, signal 135942/163680 (executing program) 2022/08/19 01:40:25 fetching corpus: 1150, signal 137268/166110 (executing program) 2022/08/19 01:40:25 fetching corpus: 1200, signal 138950/168811 (executing program) 2022/08/19 01:40:25 fetching corpus: 1250, signal 140768/171626 (executing program) 2022/08/19 01:40:25 fetching corpus: 1300, signal 142792/174559 (executing program) 2022/08/19 01:40:25 fetching corpus: 1350, signal 144296/177066 (executing program) 2022/08/19 01:40:25 fetching corpus: 1400, signal 146810/180390 (executing program) 2022/08/19 01:40:25 fetching corpus: 1450, signal 148726/183259 (executing program) 2022/08/19 01:40:25 fetching corpus: 1500, signal 150846/186209 (executing program) 2022/08/19 01:40:26 fetching corpus: 1550, signal 152494/188785 (executing program) 2022/08/19 01:40:26 fetching corpus: 1600, signal 153963/191127 (executing program) 2022/08/19 01:40:26 fetching corpus: 1650, signal 156033/193998 (executing program) 2022/08/19 01:40:26 fetching corpus: 1700, signal 157300/196169 (executing program) 2022/08/19 01:40:26 fetching corpus: 1750, signal 158667/198415 (executing program) 2022/08/19 01:40:26 fetching corpus: 1800, signal 160493/200999 (executing program) 2022/08/19 01:40:26 fetching corpus: 1850, signal 162318/203623 (executing program) 2022/08/19 01:40:26 fetching corpus: 1900, signal 163496/205626 (executing program) 2022/08/19 01:40:26 fetching corpus: 1950, signal 164760/207721 (executing program) 2022/08/19 01:40:27 fetching corpus: 2000, signal 165920/209716 (executing program) 2022/08/19 01:40:27 fetching corpus: 2050, signal 168227/212622 (executing program) 2022/08/19 01:40:27 fetching corpus: 2100, signal 170179/215209 (executing program) 2022/08/19 01:40:27 fetching corpus: 2150, signal 171915/217628 (executing program) 2022/08/19 01:40:27 fetching corpus: 2200, signal 173170/219647 (executing program) 2022/08/19 01:40:27 fetching corpus: 2250, signal 174677/221844 (executing program) 2022/08/19 01:40:27 fetching corpus: 2300, signal 175696/223671 (executing program) 2022/08/19 01:40:28 fetching corpus: 2350, signal 177151/225773 (executing program) 2022/08/19 01:40:28 fetching corpus: 2400, signal 178798/227999 (executing program) 2022/08/19 01:40:28 fetching corpus: 2450, signal 179674/229706 (executing program) 2022/08/19 01:40:28 fetching corpus: 2500, signal 180527/231365 (executing program) 2022/08/19 01:40:28 fetching corpus: 2550, signal 182252/233668 (executing program) 2022/08/19 01:40:28 fetching corpus: 2600, signal 183604/235684 (executing program) 2022/08/19 01:40:28 fetching corpus: 2650, signal 184700/237466 (executing program) 2022/08/19 01:40:29 fetching corpus: 2700, signal 186169/239501 (executing program) 2022/08/19 01:40:29 fetching corpus: 2750, signal 187412/241356 (executing program) 2022/08/19 01:40:29 fetching corpus: 2800, signal 188566/243156 (executing program) 2022/08/19 01:40:29 fetching corpus: 2850, signal 189998/245126 (executing program) 2022/08/19 01:40:29 fetching corpus: 2900, signal 191772/247289 (executing program) 2022/08/19 01:40:29 fetching corpus: 2950, signal 193155/249222 (executing program) 2022/08/19 01:40:29 fetching corpus: 3000, signal 194321/250987 (executing program) 2022/08/19 01:40:30 fetching corpus: 3050, signal 195553/252759 (executing program) 2022/08/19 01:40:30 fetching corpus: 3100, signal 196159/254091 (executing program) 2022/08/19 01:40:30 fetching corpus: 3150, signal 197307/255760 (executing program) 2022/08/19 01:40:30 fetching corpus: 3200, signal 198302/257301 (executing program) 2022/08/19 01:40:30 fetching corpus: 3250, signal 199253/258875 (executing program) 2022/08/19 01:40:30 fetching corpus: 3300, signal 200423/260503 (executing program) 2022/08/19 01:40:30 fetching corpus: 3350, signal 201529/262062 (executing program) 2022/08/19 01:40:30 fetching corpus: 3400, signal 202326/263448 (executing program) 2022/08/19 01:40:31 fetching corpus: 3450, signal 203796/265255 (executing program) 2022/08/19 01:40:31 fetching corpus: 3500, signal 204848/266855 (executing program) 2022/08/19 01:40:31 fetching corpus: 3550, signal 206100/268517 (executing program) 2022/08/19 01:40:31 fetching corpus: 3600, signal 207015/269969 (executing program) 2022/08/19 01:40:31 fetching corpus: 3650, signal 208076/271510 (executing program) 2022/08/19 01:40:31 fetching corpus: 3700, signal 208850/272888 (executing program) 2022/08/19 01:40:32 fetching corpus: 3750, signal 210232/274590 (executing program) 2022/08/19 01:40:32 fetching corpus: 3800, signal 211008/275866 (executing program) 2022/08/19 01:40:32 fetching corpus: 3850, signal 212151/277384 (executing program) 2022/08/19 01:40:32 fetching corpus: 3900, signal 212899/278663 (executing program) 2022/08/19 01:40:32 fetching corpus: 3950, signal 213439/279774 (executing program) 2022/08/19 01:40:32 fetching corpus: 4000, signal 214241/281039 (executing program) 2022/08/19 01:40:32 fetching corpus: 4050, signal 215141/282364 (executing program) 2022/08/19 01:40:32 fetching corpus: 4100, signal 216491/283944 (executing program) 2022/08/19 01:40:33 fetching corpus: 4150, signal 217278/285192 (executing program) 2022/08/19 01:40:33 fetching corpus: 4200, signal 218244/286582 (executing program) 2022/08/19 01:40:33 fetching corpus: 4250, signal 219230/287884 (executing program) 2022/08/19 01:40:33 fetching corpus: 4300, signal 220065/289132 (executing program) 2022/08/19 01:40:33 fetching corpus: 4350, signal 220636/290243 (executing program) 2022/08/19 01:40:33 fetching corpus: 4400, signal 221417/291447 (executing program) 2022/08/19 01:40:33 fetching corpus: 4450, signal 222187/292634 (executing program) 2022/08/19 01:40:33 fetching corpus: 4500, signal 222872/293790 (executing program) 2022/08/19 01:40:34 fetching corpus: 4550, signal 223560/294942 (executing program) 2022/08/19 01:40:34 fetching corpus: 4600, signal 224310/296099 (executing program) 2022/08/19 01:40:34 fetching corpus: 4650, signal 224917/297174 (executing program) 2022/08/19 01:40:34 fetching corpus: 4700, signal 225911/298413 (executing program) 2022/08/19 01:40:34 fetching corpus: 4750, signal 226589/299557 (executing program) 2022/08/19 01:40:34 fetching corpus: 4800, signal 227330/300648 (executing program) 2022/08/19 01:40:34 fetching corpus: 4850, signal 228193/301860 (executing program) 2022/08/19 01:40:34 fetching corpus: 4900, signal 228997/303011 (executing program) 2022/08/19 01:40:35 fetching corpus: 4950, signal 229828/304116 (executing program) 2022/08/19 01:40:35 fetching corpus: 5000, signal 230505/305188 (executing program) 2022/08/19 01:40:35 fetching corpus: 5050, signal 231090/306261 (executing program) 2022/08/19 01:40:35 fetching corpus: 5100, signal 231911/307383 (executing program) 2022/08/19 01:40:35 fetching corpus: 5150, signal 232741/308460 (executing program) 2022/08/19 01:40:35 fetching corpus: 5200, signal 233359/309473 (executing program) 2022/08/19 01:40:36 fetching corpus: 5250, signal 233789/310412 (executing program) 2022/08/19 01:40:36 fetching corpus: 5300, signal 234447/311422 (executing program) 2022/08/19 01:40:36 fetching corpus: 5350, signal 234925/312317 (executing program) 2022/08/19 01:40:36 fetching corpus: 5400, signal 235568/313269 (executing program) 2022/08/19 01:40:36 fetching corpus: 5450, signal 236182/314244 (executing program) 2022/08/19 01:40:36 fetching corpus: 5500, signal 236973/315309 (executing program) 2022/08/19 01:40:36 fetching corpus: 5550, signal 237422/316195 (executing program) 2022/08/19 01:40:36 fetching corpus: 5600, signal 237973/317133 (executing program) 2022/08/19 01:40:37 fetching corpus: 5650, signal 238512/318049 (executing program) 2022/08/19 01:40:37 fetching corpus: 5700, signal 239397/319111 (executing program) 2022/08/19 01:40:37 fetching corpus: 5750, signal 240271/320159 (executing program) 2022/08/19 01:40:37 fetching corpus: 5800, signal 240886/321057 (executing program) 2022/08/19 01:40:37 fetching corpus: 5850, signal 241844/322117 (executing program) 2022/08/19 01:40:37 fetching corpus: 5900, signal 242370/323002 (executing program) 2022/08/19 01:40:37 fetching corpus: 5950, signal 243159/323989 (executing program) 2022/08/19 01:40:38 fetching corpus: 6000, signal 243964/324932 (executing program) 2022/08/19 01:40:38 fetching corpus: 6050, signal 244614/325816 (executing program) 2022/08/19 01:40:38 fetching corpus: 6100, signal 245444/326786 (executing program) 2022/08/19 01:40:38 fetching corpus: 6150, signal 246010/327662 (executing program) 2022/08/19 01:40:38 fetching corpus: 6200, signal 246745/328536 (executing program) 2022/08/19 01:40:38 fetching corpus: 6250, signal 247463/329414 (executing program) 2022/08/19 01:40:38 fetching corpus: 6300, signal 248246/330339 (executing program) 2022/08/19 01:40:39 fetching corpus: 6350, signal 249062/331240 (executing program) 2022/08/19 01:40:39 fetching corpus: 6400, signal 249601/332061 (executing program) 2022/08/19 01:40:39 fetching corpus: 6450, signal 250093/332832 (executing program) 2022/08/19 01:40:39 fetching corpus: 6500, signal 250890/333691 (executing program) 2022/08/19 01:40:39 fetching corpus: 6550, signal 251228/334439 (executing program) 2022/08/19 01:40:39 fetching corpus: 6600, signal 251988/335264 (executing program) 2022/08/19 01:40:39 fetching corpus: 6650, signal 252574/336043 (executing program) 2022/08/19 01:40:39 fetching corpus: 6700, signal 253347/336866 (executing program) 2022/08/19 01:40:40 fetching corpus: 6750, signal 253903/337650 (executing program) 2022/08/19 01:40:40 fetching corpus: 6800, signal 254719/338488 (executing program) 2022/08/19 01:40:40 fetching corpus: 6850, signal 255359/339296 (executing program) 2022/08/19 01:40:40 fetching corpus: 6900, signal 256186/340111 (executing program) 2022/08/19 01:40:40 fetching corpus: 6950, signal 257427/341045 (executing program) 2022/08/19 01:40:40 fetching corpus: 7000, signal 258063/341795 (executing program) 2022/08/19 01:40:40 fetching corpus: 7050, signal 258513/342479 (executing program) 2022/08/19 01:40:41 fetching corpus: 7100, signal 259345/343261 (executing program) 2022/08/19 01:40:41 fetching corpus: 7150, signal 259726/343959 (executing program) 2022/08/19 01:40:41 fetching corpus: 7200, signal 260182/344619 (executing program) 2022/08/19 01:40:41 fetching corpus: 7250, signal 260768/345309 (executing program) 2022/08/19 01:40:41 fetching corpus: 7300, signal 261315/346030 (executing program) 2022/08/19 01:40:41 fetching corpus: 7350, signal 261739/346690 (executing program) 2022/08/19 01:40:41 fetching corpus: 7400, signal 262220/347359 (executing program) 2022/08/19 01:40:41 fetching corpus: 7450, signal 262733/348024 (executing program) 2022/08/19 01:40:41 fetching corpus: 7500, signal 263153/348608 (executing program) 2022/08/19 01:40:42 fetching corpus: 7550, signal 263442/349220 (executing program) 2022/08/19 01:40:42 fetching corpus: 7600, signal 263972/349892 (executing program) 2022/08/19 01:40:42 fetching corpus: 7650, signal 264439/350539 (executing program) 2022/08/19 01:40:42 fetching corpus: 7700, signal 264700/351131 (executing program) 2022/08/19 01:40:42 fetching corpus: 7750, signal 265254/351776 (executing program) 2022/08/19 01:40:42 fetching corpus: 7800, signal 265609/352416 (executing program) 2022/08/19 01:40:42 fetching corpus: 7850, signal 266228/353051 (executing program) 2022/08/19 01:40:42 fetching corpus: 7900, signal 266622/353633 (executing program) 2022/08/19 01:40:42 fetching corpus: 7950, signal 267088/354241 (executing program) 2022/08/19 01:40:43 fetching corpus: 8000, signal 267781/354887 (executing program) 2022/08/19 01:40:43 fetching corpus: 8050, signal 268119/355457 (executing program) 2022/08/19 01:40:43 fetching corpus: 8100, signal 268446/356044 (executing program) 2022/08/19 01:40:43 fetching corpus: 8150, signal 269265/356680 (executing program) 2022/08/19 01:40:43 fetching corpus: 8200, signal 269858/357271 (executing program) 2022/08/19 01:40:43 fetching corpus: 8250, signal 270203/357838 (executing program) 2022/08/19 01:40:43 fetching corpus: 8300, signal 270637/358471 (executing program) 2022/08/19 01:40:43 fetching corpus: 8350, signal 271048/359060 (executing program) 2022/08/19 01:40:44 fetching corpus: 8400, signal 271349/359607 (executing program) 2022/08/19 01:40:44 fetching corpus: 8450, signal 271773/360186 (executing program) 2022/08/19 01:40:44 fetching corpus: 8500, signal 272154/360742 (executing program) 2022/08/19 01:40:44 fetching corpus: 8550, signal 272511/361290 (executing program) 2022/08/19 01:40:44 fetching corpus: 8600, signal 272975/361869 (executing program) 2022/08/19 01:40:44 fetching corpus: 8650, signal 273469/362418 (executing program) 2022/08/19 01:40:44 fetching corpus: 8700, signal 273805/362932 (executing program) 2022/08/19 01:40:44 fetching corpus: 8750, signal 274078/363476 (executing program) 2022/08/19 01:40:45 fetching corpus: 8800, signal 274437/363988 (executing program) 2022/08/19 01:40:45 fetching corpus: 8850, signal 274904/364543 (executing program) 2022/08/19 01:40:45 fetching corpus: 8900, signal 275153/365056 (executing program) 2022/08/19 01:40:45 fetching corpus: 8950, signal 275548/365559 (executing program) 2022/08/19 01:40:45 fetching corpus: 9000, signal 275969/366089 (executing program) 2022/08/19 01:40:45 fetching corpus: 9050, signal 276436/366599 (executing program) 2022/08/19 01:40:45 fetching corpus: 9100, signal 277141/367113 (executing program) 2022/08/19 01:40:45 fetching corpus: 9150, signal 277758/367613 (executing program) 2022/08/19 01:40:46 fetching corpus: 9200, signal 278416/368071 (executing program) 2022/08/19 01:40:46 fetching corpus: 9250, signal 278934/368071 (executing program) 2022/08/19 01:40:46 fetching corpus: 9300, signal 279308/368071 (executing program) 2022/08/19 01:40:46 fetching corpus: 9350, signal 279644/368071 (executing program) 2022/08/19 01:40:46 fetching corpus: 9400, signal 280328/368071 (executing program) 2022/08/19 01:40:46 fetching corpus: 9450, signal 280659/368071 (executing program) 2022/08/19 01:40:47 fetching corpus: 9500, signal 281012/368071 (executing program) 2022/08/19 01:40:47 fetching corpus: 9550, signal 281363/368071 (executing program) 2022/08/19 01:40:47 fetching corpus: 9600, signal 281878/368071 (executing program) 2022/08/19 01:40:47 fetching corpus: 9650, signal 282316/368071 (executing program) 2022/08/19 01:40:47 fetching corpus: 9700, signal 282604/368071 (executing program) 2022/08/19 01:40:47 fetching corpus: 9750, signal 282949/368071 (executing program) 2022/08/19 01:40:47 fetching corpus: 9800, signal 283295/368071 (executing program) 2022/08/19 01:40:47 fetching corpus: 9850, signal 283711/368071 (executing program) 2022/08/19 01:40:47 fetching corpus: 9900, signal 284203/368071 (executing program) 2022/08/19 01:40:48 fetching corpus: 9950, signal 284787/368071 (executing program) 2022/08/19 01:40:48 fetching corpus: 10000, signal 285398/368071 (executing program) 2022/08/19 01:40:48 fetching corpus: 10050, signal 285771/368071 (executing program) 2022/08/19 01:40:48 fetching corpus: 10100, signal 286205/368071 (executing program) 2022/08/19 01:40:48 fetching corpus: 10150, signal 286658/368071 (executing program) 2022/08/19 01:40:48 fetching corpus: 10200, signal 287087/368071 (executing program) 2022/08/19 01:40:48 fetching corpus: 10250, signal 287569/368071 (executing program) 2022/08/19 01:40:49 fetching corpus: 10300, signal 287835/368071 (executing program) 2022/08/19 01:40:49 fetching corpus: 10350, signal 288315/368071 (executing program) 2022/08/19 01:40:49 fetching corpus: 10400, signal 288779/368071 (executing program) 2022/08/19 01:40:49 fetching corpus: 10450, signal 289275/368071 (executing program) 2022/08/19 01:40:49 fetching corpus: 10500, signal 289704/368071 (executing program) 2022/08/19 01:40:49 fetching corpus: 10550, signal 290259/368071 (executing program) 2022/08/19 01:40:49 fetching corpus: 10600, signal 290544/368134 (executing program) 2022/08/19 01:40:49 fetching corpus: 10650, signal 290970/368134 (executing program) 2022/08/19 01:40:50 fetching corpus: 10700, signal 291422/368134 (executing program) 2022/08/19 01:40:50 fetching corpus: 10750, signal 291766/368134 (executing program) 2022/08/19 01:40:50 fetching corpus: 10800, signal 292015/368134 (executing program) 2022/08/19 01:40:50 fetching corpus: 10850, signal 292600/368134 (executing program) 2022/08/19 01:40:50 fetching corpus: 10900, signal 292882/368134 (executing program) 2022/08/19 01:40:50 fetching corpus: 10950, signal 293164/368134 (executing program) 2022/08/19 01:40:50 fetching corpus: 11000, signal 293514/368134 (executing program) 2022/08/19 01:40:50 fetching corpus: 11050, signal 293887/368134 (executing program) 2022/08/19 01:40:51 fetching corpus: 11100, signal 294237/368134 (executing program) 2022/08/19 01:40:51 fetching corpus: 11150, signal 294791/368134 (executing program) 2022/08/19 01:40:51 fetching corpus: 11200, signal 295141/368134 (executing program) 2022/08/19 01:40:51 fetching corpus: 11250, signal 295448/368134 (executing program) 2022/08/19 01:40:51 fetching corpus: 11300, signal 295787/368134 (executing program) 2022/08/19 01:40:51 fetching corpus: 11350, signal 296056/368134 (executing program) 2022/08/19 01:40:51 fetching corpus: 11400, signal 296465/368134 (executing program) 2022/08/19 01:40:51 fetching corpus: 11450, signal 296659/368134 (executing program) 2022/08/19 01:40:52 fetching corpus: 11500, signal 296926/368134 (executing program) 2022/08/19 01:40:52 fetching corpus: 11550, signal 297149/368134 (executing program) 2022/08/19 01:40:52 fetching corpus: 11600, signal 297365/368134 (executing program) 2022/08/19 01:40:52 fetching corpus: 11650, signal 297659/368134 (executing program) 2022/08/19 01:40:52 fetching corpus: 11700, signal 297993/368134 (executing program) 2022/08/19 01:40:52 fetching corpus: 11750, signal 298310/368134 (executing program) 2022/08/19 01:40:52 fetching corpus: 11800, signal 298786/368134 (executing program) 2022/08/19 01:40:53 fetching corpus: 11850, signal 299142/368134 (executing program) 2022/08/19 01:40:53 fetching corpus: 11900, signal 299456/368134 (executing program) 2022/08/19 01:40:53 fetching corpus: 11950, signal 299828/368134 (executing program) 2022/08/19 01:40:53 fetching corpus: 12000, signal 300210/368134 (executing program) 2022/08/19 01:40:53 fetching corpus: 12050, signal 300426/368134 (executing program) 2022/08/19 01:40:53 fetching corpus: 12100, signal 300700/368134 (executing program) 2022/08/19 01:40:53 fetching corpus: 12150, signal 301041/368134 (executing program) 2022/08/19 01:40:53 fetching corpus: 12200, signal 301440/368134 (executing program) 2022/08/19 01:40:54 fetching corpus: 12250, signal 301780/368134 (executing program) 2022/08/19 01:40:54 fetching corpus: 12300, signal 302045/368134 (executing program) 2022/08/19 01:40:54 fetching corpus: 12350, signal 302393/368134 (executing program) 2022/08/19 01:40:54 fetching corpus: 12400, signal 302721/368134 (executing program) 2022/08/19 01:40:54 fetching corpus: 12450, signal 303023/368134 (executing program) 2022/08/19 01:40:54 fetching corpus: 12500, signal 303320/368134 (executing program) 2022/08/19 01:40:54 fetching corpus: 12550, signal 303734/368134 (executing program) 2022/08/19 01:40:54 fetching corpus: 12600, signal 304270/368134 (executing program) 2022/08/19 01:40:55 fetching corpus: 12650, signal 304587/368134 (executing program) 2022/08/19 01:40:55 fetching corpus: 12700, signal 304877/368134 (executing program) 2022/08/19 01:40:55 fetching corpus: 12750, signal 305113/368134 (executing program) 2022/08/19 01:40:55 fetching corpus: 12800, signal 305677/368134 (executing program) 2022/08/19 01:40:55 fetching corpus: 12850, signal 305969/368134 (executing program) 2022/08/19 01:40:55 fetching corpus: 12900, signal 306248/368134 (executing program) 2022/08/19 01:40:55 fetching corpus: 12950, signal 306513/368134 (executing program) 2022/08/19 01:40:55 fetching corpus: 13000, signal 306854/368134 (executing program) 2022/08/19 01:40:56 fetching corpus: 13050, signal 307133/368134 (executing program) 2022/08/19 01:40:56 fetching corpus: 13100, signal 307466/368135 (executing program) 2022/08/19 01:40:56 fetching corpus: 13150, signal 307824/368135 (executing program) 2022/08/19 01:40:56 fetching corpus: 13200, signal 308277/368135 (executing program) 2022/08/19 01:40:56 fetching corpus: 13250, signal 308717/368135 (executing program) 2022/08/19 01:40:56 fetching corpus: 13300, signal 309071/368135 (executing program) 2022/08/19 01:40:56 fetching corpus: 13350, signal 309378/368135 (executing program) 2022/08/19 01:40:57 fetching corpus: 13400, signal 309773/368135 (executing program) 2022/08/19 01:40:57 fetching corpus: 13450, signal 310046/368135 (executing program) 2022/08/19 01:40:57 fetching corpus: 13500, signal 310447/368135 (executing program) 2022/08/19 01:40:57 fetching corpus: 13550, signal 310722/368135 (executing program) 2022/08/19 01:40:57 fetching corpus: 13600, signal 310972/368135 (executing program) 2022/08/19 01:40:57 fetching corpus: 13650, signal 311305/368135 (executing program) 2022/08/19 01:40:57 fetching corpus: 13700, signal 311640/368135 (executing program) 2022/08/19 01:40:57 fetching corpus: 13750, signal 311863/368135 (executing program) 2022/08/19 01:40:58 fetching corpus: 13800, signal 312053/368135 (executing program) 2022/08/19 01:40:58 fetching corpus: 13850, signal 312412/368135 (executing program) 2022/08/19 01:40:58 fetching corpus: 13900, signal 312700/368135 (executing program) 2022/08/19 01:40:58 fetching corpus: 13950, signal 313020/368135 (executing program) 2022/08/19 01:40:58 fetching corpus: 14000, signal 313223/368135 (executing program) 2022/08/19 01:40:58 fetching corpus: 14050, signal 313628/368135 (executing program) 2022/08/19 01:40:58 fetching corpus: 14100, signal 313968/368135 (executing program) 2022/08/19 01:40:59 fetching corpus: 14150, signal 314324/368135 (executing program) 2022/08/19 01:40:59 fetching corpus: 14200, signal 314717/368135 (executing program) 2022/08/19 01:40:59 fetching corpus: 14250, signal 315070/368135 (executing program) 2022/08/19 01:40:59 fetching corpus: 14300, signal 315288/368135 (executing program) 2022/08/19 01:40:59 fetching corpus: 14350, signal 315543/368135 (executing program) 2022/08/19 01:40:59 fetching corpus: 14400, signal 315691/368135 (executing program) 2022/08/19 01:40:59 fetching corpus: 14415, signal 315752/368135 (executing program) 2022/08/19 01:40:59 fetching corpus: 14415, signal 315752/368135 (executing program) 2022/08/19 01:41:02 starting 8 fuzzer processes 01:41:02 executing program 0: socketpair(0x2b, 0x800, 0x8000, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NFT_BATCH(r1, &(0x7f0000001c40)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001c00)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWOBJ={0x20, 0x12, 0xa, 0x301, 0x0, 0x0, {0x7, 0x0, 0x4}, @NFT_OBJECT_COUNTER=@NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}}, @NFT_MSG_DELSETELEM={0x1b04, 0xe, 0xa, 0x801, 0x0, 0x0, {0x1, 0x0, 0x7}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1ae8, 0x3, 0x0, 0x1, [{0x4cc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_KEY={0x260, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x54, 0x1, "432f239dad9ef58c7f84834fcdb9a9f88056de23c7162efcd715914db589c555f07fbf07bff722d7cf2a28a80fff7418dd1a8e86b171d3f9e1d440120ba9d97e25332dffe37090f1ee66dfb730fdf339"}, @NFTA_DATA_VALUE={0xda, 0x1, "77622131aee3e76016e64f493069a59296d48c9bd73006ade82d40ccf4ed972bb3e5abacd1d6412b2d511c64a6142369de6292e0ead95ee687a87a6a5509ddb6bc73567263a8ab21f959a52843da6fe5e50a420abae3cbf71833ea23687818b994531e8ffbede221962d64664d2666d859a8e0d02cdce2192fa90741c5be922a7b515b694330c35788a767f0d568a4f5847b4cffae1282b6301c37ee4423c4c47ebfcd8c5496906b75b7c3f02c117e4b792963831c81fc3b1e0487b6d7cfe497ee85ae7432cc7e432ae2e31b5349d73ffae15b5d0411"}, @NFTA_DATA_VALUE={0xc7, 0x1, "0be0017b0e2e7572b92aa0b4efaf942c7b99b62006f9d934ee108ae3fb927669707e1e16cba618d7f08a76b5a746eb9bc7baa6b04e5f9f63a7007ae18287db34736ae6b4862c958b9332ff5eebf17079566827269f95acd8b0f40938cb6ad235748b017887504aa0939a8884a45b6c09ad8c7af36b07fc6aa03bde3dfd916fc75978e3d24a798ce8239be707961b1fe840911afdc1f2f1c0f78cb54d4cc0d08d86dfd9eafb1196f1b0d04d97e2d3da44905e257fb36651ad1a9fac41494369e3e54bcc"}, @NFTA_DATA_VALUE={0x63, 0x1, "c5397b7efc71fdaceb3da95d53676348bd8d6af8f3da05075f7209ed0f028e91b33d41460d69eb9488f0ea9ef15f8c26959e9e1c29b8b9d53c3b901e2914a34f38f423b37eeb7d800580c8fc863c6b6f0560f0b084265c26657f69202efd89"}]}, @NFTA_SET_ELEM_KEY_END={0x244, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0x21, 0x1, "13a24a2a9c27bd431fad279ccabf8fd0d4ac257431b15c8a403773069a"}, @NFTA_DATA_VALUE={0x5a, 0x1, "57bd33a3327377c80cff0008dafa1f816aeceabb9de3b7f19e003458fb916975b62a57c3987bbecd5ad7860062f1568d38ab4d879bf5244dda9f31ff0b79a7d71463192949cf34d6e814d6d8bccee36c9fc39739b8e2"}, @NFTA_DATA_VALUE={0xad, 0x1, "49b74d8ef181cb0fb6d53f5d3d304d6e14e1f30ad8b456c5c1a59aef6bacbd5531b1e38a1ec9f32bbd51af6920da75c4a5d1fc7be362502bdf24985d59272c6e37ccb2cde02f6a74cc6deb4e4e2ea926b36c3bf95ba3bce9ec2646831a8e227a31bf0c6b28c2b6d2ee243fea6c2fa045cafe88c9139001ff70d6a77474526da5b0f99283b21a0aef2569cbbbf59a69ebb50c9951be5d68a5016e029043f01497cecab508827843173e"}, @NFTA_DATA_VERDICT={0x38, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x3b, 0x1, "824da7b4ce793fc2aa6921912cb0b050f5f1e0abc8681e7c00824d0a17b391a63d62a896188834c1a44f3f7dfdfe5c638f454fb7a17183"}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x5}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x60, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}]}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x10001}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}]}, {0x156c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0xf27f}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x7cf}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x9}, @NFTA_SET_ELEM_KEY_END={0x1a8, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0x13, 0x1, "f182a943483cd3d838c6622d9c6611"}, @NFTA_DATA_VALUE={0xfc, 0x1, "ee27675f7428b161015dd5c527a23c36089f92839bbe806b2040e7fdfa954bc88b00fccea4504757f71eddce7c300b54842975eb71d2f1fc358b46bdc28649b4cf51298a82edeb1fbab70e219bc2008c2a270d10aae7c4301acf533fd38c6caeaa672955e32839275ea6d363b1d314a6e8179508de8c8950bca6c1cfc98b9fb68d4b0d7ff7e04da2b09871ab42fe3a040fc625d55c25550aa03604f2e46eb44440fcd5418b5dddc1b0eba234527c882eb202c624aaa6eae9ac616be9c47db89ab61cbac56351b0d6c6114e589c9bcedf2d8ba1b2486c925e0f34581d8b62a59f5c7adc2df4cffde2f98e730a046f38861f6c7d1a9bd6c09d"}, @NFTA_DATA_VALUE={0x91, 0x1, "9969b2078eced2304ee3a9ff63cfbf881a6667f0b8aa4f88bf802cb665583d6aba7a78e150c99516fb2edb5742b00ee369a3e9ae0cf1563c076f39ec17932879a5aaeefa56d1faf1255fc36d0e93647654c2f492fc92ac141a9bcf0badff01478a68aaa7278f5eb4fe78c1c00cb5e869a4f4e26c0c799460263884c23619b36874852a368934a1e030ab21c43e"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0xe64}, @NFTA_SET_ELEM_DATA={0x1314, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x8a, 0x1, "cba677354949e798adcb27a3f7eea02874d9de0f4082015b976bb004b1ac431c8aaa2b79c436c349f7e24ca5f120553d989ff5cedf04f915963b08b2225be6d8e34fd3a51351f20c7e2cc44610adeb094b7d9f6753fea3f0eaeef7974cb6703b1a48df05d9d5cad5293d3658f5892437a6f841b4b28e5e83ffab02c37cd8e76d2080112aeea2"}, @NFTA_DATA_VALUE={0x85, 0x1, "ad1101d8d2cbb0e9242c2dac8ff7740c435527b848dd993d6bc2e17dc6321d33278e8b71d3d02d07c96f42ea5bf170bb5d751bf9a5d0d4a13d7d93073d2ac24dde201fb8a9bd074b333130f4df3ab0c9dbb81e576190b249bebdf8aea021fb0693dd6637678200759d9aaf853b48796255d3626630ba24a824bf5d65d0567ac35f"}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VALUE={0x1004, 0x1, "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"}, @NFTA_DATA_VALUE={0xc1, 0x1, "a475d544a2c165130f425adff161730696327a724f6558b90ab5a6a8ee2300d37caf0eb0331caaff392a68b23a2fc114810a04dbd47c7847037e1b3720ae8f130ab4467f7563264dd6ea71775ad9a214b177793e03a90f1110e35b3bfe98a5490ab3a241e92cbdeb56314dfa2abdaa2d91a8cbcb0a690ce8ef4212aa52b0c0a8c8878717d81433e4974a1fad9a6ddc80176895c6d70c2c546ba55f61f2eb17c2d79bb48c8d6bed901b0a9e39c8d726cff54abf0881866ea2c04620656f"}, @NFTA_DATA_VERDICT={0x68, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0xad, 0x1, "81ee9d7c902cdef2d0b56aa27bd46b0261dd25e007a62ed0e395a8feeb7e545e7ca9ed74795bb89d19f2abb452ccfa1ee42850e5f5e21d1056e2619594f6636981c19d6afcaa7c62d24c014449a3d70522dcfa64f89a5ea563f0f0e7755a7783ee9a01067cfcdf1bc7f9328bf991b6bf13f8a7e9da6655133bc69fa205ca7ae9aa9c64ac23ebedeb2b84ffbbfd0912ba548738eb755a5b3c8e830311383e0c328f4ddfd2774ff74c4c"}]}, @NFTA_SET_ELEM_USERDATA={0x66, 0x6, 0x1, 0x0, "a2dcb3f406be086e4716c90da90e656a5ce94451df8dcac2af7a08cadb6004c6e27ee50fb9d4747e27a77ffdf30a200790126138b75121ecb27bfb1c171b85c51b1432c7637b9832b63e8fdd6344e59e19122fd1545c8a770b632f6865f15565d30c"}]}, {0xac, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_USERDATA={0x67, 0x6, 0x1, 0x0, "f82b7e86b065b2f7e133ba341136a984440d06ba79827257d2ddbce4728a7ba767140ad12c274da3d68f48d45e1f3a09cca70b4227b07a3e055b5334c007db7c1e49558834b36fae40079486f1c464246928b60b450040a6659156f6ba460c03969294"}, @NFTA_SET_ELEM_KEY_END={0x40, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0x4}, @NFTA_DATA_VERDICT={0x38, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}]}]}]}]}], {0x14}}, 0x1b4c}, 0x1, 0x0, 0x0, 0x800}, 0x1) r2 = socket(0xb, 0x6, 0x7ff) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f00000054c0)={'syztnl2\x00', &(0x7f0000005440)={'syztnl2\x00', 0x0, 0x29, 0x2, 0x1, 0x7, 0x2, @ipv4={'\x00', '\xff\xff', @loopback}, @dev={0xfe, 0x80, '\x00', 0x2e}, 0x8, 0x1, 0x7fff, 0x6}}) sendmmsg$inet6(r2, &(0x7f00000085c0)=[{{&(0x7f0000001c80)={0xa, 0x4e20, 0x2, @empty, 0x8}, 0x1c, &(0x7f0000001cc0)}}, {{&(0x7f0000001d00)={0xa, 0x4e20, 0x7f, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x7b9f}, 0x1c, &(0x7f0000001d80)=[{&(0x7f0000001d40)="79f160a593a6df81c556f762ddafc3835d2c52c397b81b221c57e1d1f38c396b8d6506976c97f34540fe1eb7697c169583b068b531591aaf4d8760d0f2e883", 0x3f}], 0x1, &(0x7f0000001dc0)=[@pktinfo={{0x24, 0x29, 0x32, {@dev={0xfe, 0x80, '\x00', 0x2e}}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x80000000}}, @rthdr_2292={{0x58, 0x29, 0x39, {0x2c, 0x8, 0x2, 0x1, 0x0, [@private2, @private2={0xfc, 0x2, '\x00', 0x1}, @remote, @mcast1]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x80000000}}, @rthdr={{0x58, 0x29, 0x39, {0x4, 0x8, 0x2, 0x2, 0x0, [@private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private0, @loopback]}}}], 0x108}}, {{&(0x7f0000001f00)={0xa, 0x4e20, 0x1, @loopback, 0xffffff2b}, 0x1c, &(0x7f0000002fc0)=[{&(0x7f0000001f40)="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", 0x1000}, {&(0x7f0000002f40)}, {&(0x7f0000002f80)="cf40f46c4179b04821798a9e9039e3f1159545529ffd3c92b7b5ef7d0a030e8ea688f816a4ca9e", 0x27}], 0x3, &(0x7f0000003000)=[@pktinfo={{0x24, 0x29, 0x32, {@rand_addr=' \x01\x00'}}}, @dstopts_2292={{0x28, 0x29, 0x4, {0x0, 0x1, '\x00', [@ra={0x5, 0x2, 0xff}, @ra={0x5, 0x2, 0xfe0f}, @pad1]}}}, @pktinfo={{0x24, 0x29, 0x32, {@loopback}}}, @flowinfo={{0x14, 0x29, 0xb, 0x8}}, @dontfrag={{0x14, 0x29, 0x3e, 0x5}}, @dontfrag={{0x14, 0x29, 0x3e, 0xcc3}}, @dontfrag={{0x14, 0x29, 0x3e, 0x20}}, @dontfrag={{0x14}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x8}}], 0x108}}, {{&(0x7f0000003140)={0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, '\x00', 0x1e}, 0x8}, 0x1c, &(0x7f0000005380)=[{&(0x7f0000003180)="d947610a0185409439a99256d88f14ca82285025009a953784f96c310e72c5bdf48d0e0e6342d04c", 0x28}, {&(0x7f00000031c0)="16cf543dfb0345eda914d10ce7e877dc565eba3196d310ab49772f4a7dae2b85993c057c9e83d49c877cddafd2f45a048a6ea57c19eea3df492b1d31f11ba1691483d198be1b310ab45eb6ecb6ae6c22a26dbbd4604a4951b467d91e3362a1bc2f802e151655c9fc4b9b8035b0101a0171773b6f0d07c9922922a40755627e37e615034c1ea32d5fdcbe8ff78b7397821ed4fd72e37ff7834010a9c31e7e66687ffbae86ab30955d20247e8e5ae39ac91fdd39da2ffa0b25f8f326a502760827d6c3208b3c969fac09608e847825feffd1949dcf8dc04d3219c8863a", 0xdc}, {&(0x7f00000032c0)}, {&(0x7f0000003300)="7ec4f5a5947f6a086f0701a7b50f846d67d171fba75d1acb63a1eab9bd88a199edbf9010f4950d9e2b5e89d086777ef6872fee5daee3ebceb6e0604d9935a00f655380191d9f47e411ac0bc6d16b2823b21977634149cba174b8", 0x5a}, {&(0x7f0000003380)="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", 0x1000}, {&(0x7f0000004380)="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", 0x1000}], 0x6, &(0x7f0000005500)=[@hoplimit={{0x14}}, @pktinfo={{0x24, 0x29, 0x32, {@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', r3}}}, @flowinfo={{0x14, 0x29, 0xb, 0x4}}, @hoplimit={{0x14, 0x29, 0x34, 0x4}}, @tclass={{0x14, 0x29, 0x43, 0x6}}, @dontfrag={{0x14, 0x29, 0x3e, 0x81}}, @rthdr={{0x38, 0x29, 0x39, {0x2c, 0x4, 0x2, 0x1, 0x0, [@ipv4={'\x00', '\xff\xff', @multicast2}, @local]}}}, @hopopts={{0x1110, 0x29, 0x36, {0x23, 0x21e, '\x00', [@hao={0xc9, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @hao={0xc9, 0x10, @remote}, @generic={0xff, 0xcf, "e4fa3a06c1d8f9209cc1c40643e7c30e78c3705ccedbd4aa68dfe8cdedfba7bba767d2a9020b319e1575d8584a8a07b95a3cf497a9aa31355d31b5cb1111970941c0dae203ca6aa01a311dd1c312b8effff5f2113e64d6617554f06c74ccbaa0b5adb15bd4f7c2a5e9776c11198cb38330208453b3f2970827b04fb9b0341fcfcb71528ceb251c3168f3e9ce8b54bad47d508c787f716903ab9a936cc8fb735d248d94da504b02afac9d1190f60f4e4dc9e83f348dbf890c03364d932be3397d575448eb76d25b09ef4744cbe0892b"}, @generic={0x1, 0x1000, "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"}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x65}}, @tclass={{0x14, 0x29, 0x43, 0x7}}], 0x1218}}, {{&(0x7f0000006740)={0xa, 0x4e20, 0x1, @dev={0xfe, 0x80, '\x00', 0x3a}, 0x1}, 0x1c, &(0x7f0000006c40)=[{&(0x7f0000006780)="63cd0d5f989618ee0c15f768a42e7153f3fcc71b64d5c83500115326fc8199749c7f230bf7123f8424fb8c7f895aa58c33512ae0ab3e41c65840bbc3d4", 0x3d}, {&(0x7f00000067c0)="aa90745b0a4324df4319842aa4", 0xd}, {&(0x7f0000006800)="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", 0xfa}, {&(0x7f0000006900)="8dee304c02877a2b520f8d527c7e7b97ebbad26819c28379fd6891c27bc8863ef4fde8edeaad4eeb4d6d271aad6be9470f2d5d4ab48ccac851fa347e11abb29c7fc0dfbed7a97d9c11e70aedd522dda5e342fbcef20e1a09196ffbb0fad131c39f600468ac030e51ef55b12d760a683903550add165e5152816d72c32b1c6aea5500b0a7320c", 0x86}, {&(0x7f00000069c0)="236e805fb9f8e4beac66b518c74365e72c8ce4e58469da508dda5e1638cc25d013826fea78edae767a3a624b76fb39005de2fae66179c09c06e39b71b604ce80450b38097ccc83df96eb56ceda90e567f6db0fe2f0fed79395308c6462e0489e2fdedfb7c22e4d84007cac344fe31a23c0f57a9bda89398b5de19a6ed1b9a50d8bea6374f451e8efca51fe5a611f1144401ba34ae522aa093fadcf2f342659423369a215a1c508d869996711f5a5602bd19223a62df544ec9c60af74943708091853753ad5801f9e8c6a703233b4c1c0f12a2472ffc74ec3dd173e3f93e6e439c606d1", 0xe3}, {&(0x7f0000006ac0)="4a2f8a0739113c5f76d0f765bdec2b2bd14627ed52f767e15b043cdee8126c422f94bdec95fee5a84f54785db9ed461f471176d65d4cca25054501bd2cf3dc706801a9ddb05fce694c95cb21a37ec0eab0ae5e54d3fdd9a74290d3748261bb246179ed6d8d497c1aab3fd02b772c4bcc574df04307477ef24251b95d62a90e4b0db1f0f790be3b5aed612d1800666a156def6a2da2cf1a749fd721208bde88561c21e07e9a27", 0xa6}, {&(0x7f0000006b80)="e7abfef19e1917a0d31042a30dd5e97355eecc6e181c6ecd158e605f937d070f9ac6172d2e25ed6a8388cd8ccf47e5e9666760632a2daef73e25ca9d92e053d848493c8df7fa5c0d0dcfd96df7ac5f06d04e44a7a2ee97b30896463101c30ce34dca888299b4ff9b481778f1e66028ade3f8111329d6723bfea471a2dec12f335539bbf093c508c1ef747bc43f7c82b9365f6632dccbeb02890c44c96b67d43f7540b2b8fd24a010c806128ab46e2058a146f897ade6fa", 0xb7}], 0x7}}, {{&(0x7f0000006cc0)={0xa, 0x4e23, 0x0, @private1, 0x80}, 0x1c, &(0x7f0000006d00), 0x0, &(0x7f0000006d40)=[@rthdrdstopts={{0x18}}, @hoplimit={{0x14, 0x29, 0x34, 0x6af8}}], 0x30}}, {{&(0x7f0000006d80)={0xa, 0x4e22, 0x7000, @local, 0x2}, 0x1c, &(0x7f0000007180)=[{&(0x7f0000006dc0)="48f322047bf0512c38b0fcf2e3076d6a9cf636bf67107d9dbb506930fdae5e16f30162451ac5c174c6a63e78a5ceef5c73716aff3401dcb26208a95be2fc3eb4673a551fc0396e4b85606433acb18148e34bd85fcd34ce17", 0x58}, {&(0x7f0000006e40)="ecf28e8dc598a0f2b6657566281d4f17b66d9e235ebcd804e17f8ae68bc0537f761bb8401f1a5fd75e54e53716ca394ba8aef5c514e4a74e5ae4adf7f33d43aa6084d832a41aaf", 0x47}, {&(0x7f0000006ec0)="845c514c0e067c12df79a46fcf9bcf3f23c614e4f0500704e5c3d9b84014f40c33d213aa30648eebaa0ce1fb39364ebe9385429d9c762c683ed2506c4101da11f327f49129dc2c0b911f57", 0x4b}, {&(0x7f0000006f40)="783dafdd31d6f6f721871ac26305c7ea3cfdc952bf0ce448713d7dc211b9c1e19092c56c6bd77880286a0f523ac2e9e77ac6af8e70e00c09c693a7bda923a5f25ad6d9011c", 0x45}, {&(0x7f0000006fc0)="57790c3905ca62dc98a1041b51523929cae6c18495d0881ad4b9e8a29f026d0c62244bca98e9b65c1b03db09b88a1391135a0aabfb92ad2f5315f8f36e38b7152ee39cc410c83f60d16e4ed2cb7426bae0da46e6ef175985a2fce6c68aee13828736a5ef2122f27627c7dc5a57f90e91ee0826c6c957234525d24c47693599d88efeab94793fb7e713c12683efc2c8e9621a2ebb3615b7e48596ebf50246ff69207e7f6f15a3ebaeb112fd0f08fcd4fcdc5f450abd52f54d46a47d5afb34066a8ee508b6bf6743f05702f21dfe8a783defb93401", 0xd4}, {&(0x7f00000070c0)="8126a82f187ee7bce8e011", 0xb}, {&(0x7f0000007100)="8b1bea762f2c14b56aa626d1b39b3482c5c69e8ed7953a724a4feba80979baa545be3241689e636247620c7059f2605291b28ca810bace6fc64ff345d0d419cd88f38d96c40a14db4ffe60ef6992b6678f2075c42b8078c508f4438fc1b8209ffcf5f34918d66c", 0x67}], 0x7}}, {{&(0x7f0000007200)={0xa, 0x4e20, 0x80, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, 0xf9e0}, 0x1c, &(0x7f00000082c0)=[{&(0x7f0000007240)="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", 0x1000}, {&(0x7f0000008240)="a8dc6cfdac135348343437743355fb6614db5a2502efc722dc0463d16301e837ea93e1605156675392b90544e2be90044c6235ee0c934c963fccac5c5a16906bd5384319cc3772db4eee6ffcdd2b66e8912f2ca79b14", 0x56}], 0x2, &(0x7f0000008300)=[@dstopts={{0xc8, 0x29, 0x37, {0x16, 0x15, '\x00', [@generic={0x3, 0xab, "8dc47d289521a0f39e50dde1956b8d4b1cb271122d35a99277664aa4532716b173d141c3d60424294ac6846039bf947513b2dcf926dad1188ae21f71faac16099186e7b1286ee0fff70a552f81365894d9082b4aa049eed30288622ccc5828a27d4090300096a6030c7c63a3a734221bbf0fe7f20585e677dfa5432dbb9481eadfb466ffade6da145d888d6cb2ab2abaa04e0ed9bd24dc0b37b0abf19b0a499da7e09f601345a79db06702"}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x9}}, @dstopts_2292={{0x80, 0x29, 0x4, {0x67, 0xc, '\x00', [@padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x1f4e}, @calipso={0x7, 0x58, {0x1, 0x14, 0x7, 0x9, [0x1ff, 0xffffffffffffffc1, 0x9, 0x40, 0x9, 0x30, 0x7, 0x1, 0x4, 0x9]}}]}}}, @dstopts={{0x48, 0x29, 0x37, {0x29, 0x5, '\x00', [@generic={0xeb, 0x23, "7d2217dd4dd98d34b8e62d3a226cafcf26cdb2a4c4b357369bcb28a455aeec8c739587"}, @enc_lim={0x4, 0x1, 0x3f}, @pad1]}}}, @rthdr={{0x48, 0x29, 0x39, {0x2f, 0x6, 0x2, 0x8, 0x0, [@empty, @loopback, @ipv4={'\x00', '\xff\xff', @local}]}}}, @dstopts_2292={{0xd0, 0x29, 0x4, {0x2b, 0x16, '\x00', [@ra={0x5, 0x2, 0x5}, @generic={0x7, 0x63, "f08a4905f9cefc106192e7e5dd9436279d4f737e2c118d0173847c4e7c3cd3051baf180d3f69b0a7bb78e70c468e4ea97164feb8e7a6b3045c6cacb927bf310c2f337b2c64d8d65f536b83b4d9744db0ad75f966aaa1f3ec58b87794f2f7d67e80e4fe"}, @jumbo, @calipso={0x7, 0x38, {0x2, 0xc, 0xa, 0x3, [0x7, 0x5, 0x3, 0x2, 0x20, 0xffffffffffff669a]}}, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @pad1]}}}], 0x2c0}}], 0x8, 0xc0) sendmsg$NL80211_CMD_AUTHENTICATE(r2, &(0x7f00000088c0)={&(0x7f00000087c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000008880)={&(0x7f0000008800)={0x4c, 0x0, 0x2, 0x70bd25, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0xfffffff8, 0x78}}}}, [@NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x3}, @key_params=[@NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x2}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x1}], @NL80211_ATTR_SSID={0xa, 0x34, @default_ibss_ssid}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4880}, 0x4010) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000008940), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r2, &(0x7f0000008b40)={&(0x7f0000008900)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000008b00)={&(0x7f0000008980)={0x14c, r4, 0x200, 0x70bd28, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0xd}}, {@pci={{0x8}, {0x11}}, {0xd}}, {@pci={{0x8}, {0x11}}, {0xd}}, {@pci={{0x8}, {0x11}}, {0xd}}, {@pci={{0x8}, {0x11}}, {0xd}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}}, {@pci={{0x8}, {0x11}}, {0xd}}]}, 0x14c}}, 0x4000000) r5 = accept4$packet(r0, &(0x7f0000008b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008bc0)=0x14, 0x80800) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000008c00)={'veth0_to_batadv\x00', 0x0}) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000008c40)=r6) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f0000008cc0), r2) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000008e40)={'syztnl2\x00', &(0x7f0000008dc0)={'syztnl0\x00', 0x0, 0x10, 0x700, 0xff, 0x95e9, {{0x9, 0x4, 0x1, 0x9, 0x24, 0x67, 0x0, 0x55, 0x29, 0x0, @rand_addr=0x64010101, @remote, {[@ssrr={0x89, 0xf, 0xd2, [@broadcast, @remote, @multicast2]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000008f40)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000009000)={'ip6_vti0\x00', &(0x7f0000008f80)={'ip6tnl0\x00', r7, 0x4, 0x9, 0xff, 0x1f, 0x1, @rand_addr=' \x01\x00', @empty, 0x7800, 0x40, 0x2, 0x7}}) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f0000009300)={&(0x7f0000008c80)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000092c0)={&(0x7f0000009040)={0x248, r8, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x11}, 0xc0) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000009400)={&(0x7f0000009340)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000093c0)={&(0x7f0000009380)={0x14, 0x0, 0x400, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4004000}, 0x0) r12 = socket$nl_generic(0x10, 0x3, 0x10) accept(r12, &(0x7f0000009440)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f00000094c0)=0x80) getsockname$packet(r13, &(0x7f0000009500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000009540)=0x14) 01:41:02 executing program 1: ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000000)={0x0, {}, 0x0, {}, 0x1, 0x9, 0x16, 0x1, "e49438cbec9449917359da9cf187f5567c58267de687034fe71c78ed9f403e5dfbc95cf54422f17c5042cec692f927aba56155adb8fdbc59f3cf8fc7e4fc77de", "2c7c97d3158938f38346452e01d348772fa55345cfd6003eb03680df65446964", [0x0, 0x5]}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000000c0)="ddd53bad9ec61c234e6c30e391e0e8c16b59b05a4fa9c1fdb8cdbfe235d811905798f16804e62bd924c44672565defa7e459d9d5ed1c65d284a17505608a36ecd1ccc012d78d41bc4bb651f9aff8ee944c452852adfb012457bb09cde4a2aae51a7e2ad9db0c0ce6b3f1b4ddf145fd904e939870715e5674fc5bbb5cf76fbda549b3c95fe8", 0x85}, 0x68) r0 = syz_open_dev$hidraw(&(0x7f0000000200), 0x1, 0x4ac00) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000240)={"e85ade90bad9fb5972c022e1b2e3e7f1", 0x0, 0x0, {0x0, 0xffffffff}, {0xa9b, 0x10000}, 0x2, [0x8000, 0x100000000, 0x61b646e6, 0xffffffffffffffb8, 0x80, 0x8000, 0xf34, 0x7f, 0x7, 0x1, 0x400, 0x5, 0x2, 0x3e20fa0b, 0x9, 0x7ff]}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000340)={{r0}, r1, 0x4, @unused=[0x7fffffff, 0x7, 0x8000, 0xcb], @name="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"}) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000001380), 0xffffffffffffffff) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000001440)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000001400)={&(0x7f00000013c0)={0x2c, r3, 0x200, 0x70bd2c, 0x25dfdbfc, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x3f}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x1f}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x3ff}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0xc002) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000001480)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001540)={&(0x7f00000014c0)={0x5c, 0x0, 0x400, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0xff00}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@loopback}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}]}, 0x5c}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000015c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r4, &(0x7f0000001800)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000017c0)={&(0x7f0000001640)={0x148, 0x0, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, {0xd}}, {@pci={{0x8}, {0x11}}, {0xd}}, {@pci={{0x8}, {0x11}}, {0xd}}, {@pci={{0x8}, {0x11}}, {0xd}}, {@pci={{0x8}, {0x11}}, {0xd}}, {@pci={{0x8}, {0x11}}, {0xd}}, {@pci={{0x8}, {0x11}}, {0xd}}]}, 0x148}, 0x1, 0x0, 0x0, 0x40000}, 0x80) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r4, 0xc018937d, &(0x7f0000001840)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f0000001880)={{r0}, r2, 0x14, @unused=[0x9b, 0x6, 0x8, 0x100], @devid}) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f00000028c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000002980)={&(0x7f0000002880)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000002940)={&(0x7f0000002900)={0x38, 0x0, 0x90a, 0x70bd2b, 0x25dfdbfd, {{}, {@void, @val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x3f, 0x6e}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x50}]}, 0x38}, 0x1, 0x0, 0x0, 0x40040}, 0x4000) r7 = dup(r4) accept$unix(r7, &(0x7f00000029c0), &(0x7f0000002a40)=0x6e) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000002b40)={&(0x7f0000002a80)={0x10, 0x0, 0x0, 0x8000008}, 0xc, &(0x7f0000002b00)={&(0x7f0000002ac0)={0x34, 0xa, 0xa, 0x301, 0x0, 0x0, {0x5, 0x0, 0x4}, [@NFTA_SET_DATA_LEN={0x8, 0x7, 0x1, 0x0, 0x2a}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0xa}, @NFTA_SET_OBJ_TYPE={0x8, 0xf, 0x1, 0x0, 0x1}, @NFTA_SET_DATA_LEN={0x8, 0x7, 0x1, 0x0, 0x16}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0xc0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r7, 0x80089419, &(0x7f0000002b80)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000002bc0)={{0x1, 0x1, 0x18, r5}, './file0\x00'}) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r8, &(0x7f0000002d00)={&(0x7f0000002c00)={0x10, 0x0, 0x0, 0x180}, 0xc, &(0x7f0000002cc0)={&(0x7f0000002c40)={0x44, 0x0, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_ADDR={0x20, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @remote}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}]}, 0x44}, 0x1, 0x0, 0x0, 0x44}, 0x40000) [ 90.692067] audit: type=1400 audit(1660873262.232:6): avc: denied { execmem } for pid=284 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 01:41:02 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x58, 0x0, 0x40, 0x1, 0x0, 0x2, 0x80008, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0xa79, 0x1}, 0x1800, 0x0, 0xffffffac, 0x2, 0xffff, 0x9, 0x1, 0x0, 0x5, 0x0, 0x1f}, r1, 0xa, 0xffffffffffffffff, 0x1) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x114, r3, 0x2, 0x70bd2b, 0x25dfdbfb, {{}, {@void, @void}}, [@mon_options=[@NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa, 0xe8, @device_b}, @NL80211_ATTR_MNTR_FLAGS={0x14, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_OTHER_BSS={0x4}, @NL80211_MNTR_FLAG_FCSFAIL={0x4}, @NL80211_MNTR_FLAG_OTHER_BSS={0x4}, @NL80211_MNTR_FLAG_OTHER_BSS={0x4}]}, @NL80211_ATTR_MNTR_FLAGS={0x24, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_CONTROL={0x4}, @NL80211_MNTR_FLAG_PLCPFAIL={0x4}, @NL80211_MNTR_FLAG_COOK_FRAMES={0x4}, @NL80211_MNTR_FLAG_CONTROL={0x4}, @NL80211_MNTR_FLAG_FCSFAIL={0x4}, @NL80211_MNTR_FLAG_OTHER_BSS={0x4}, @NL80211_MNTR_FLAG_ACTIVE={0x4}, @NL80211_MNTR_FLAG_OTHER_BSS={0x4}]}, @NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa, 0xe8, @broadcast}, @NL80211_ATTR_MNTR_FLAGS={0x14, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_FCSFAIL={0x4}, @NL80211_MNTR_FLAG_ACTIVE={0x4}, @NL80211_MNTR_FLAG_CONTROL={0x4}, @NL80211_MNTR_FLAG_ACTIVE={0x4}]}, @NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa}, @NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "7b3c2e035effa894e663fee56e61477fab1fd1b24d1c12e9"}, @NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "856a57b509287c6f1c611c4cafd50866ca6674ff1f33fad8"}], @mon_options=[@NL80211_ATTR_MNTR_FLAGS={0x8, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_COOK_FRAMES={0x4}]}, @NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa}, @NL80211_ATTR_MNTR_FLAGS={0x24, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_FCSFAIL={0x4}, @NL80211_MNTR_FLAG_COOK_FRAMES={0x4}, @NL80211_MNTR_FLAG_PLCPFAIL={0x4}, @NL80211_MNTR_FLAG_FCSFAIL={0x4}, @NL80211_MNTR_FLAG_FCSFAIL={0x4}, @NL80211_MNTR_FLAG_FCSFAIL={0x4}, @NL80211_MNTR_FLAG_COOK_FRAMES={0x4}, @NL80211_MNTR_FLAG_PLCPFAIL={0x4}]}, @NL80211_ATTR_MNTR_FLAGS={0x18, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_CONTROL={0x4}, @NL80211_MNTR_FLAG_PLCPFAIL={0x4}, @NL80211_MNTR_FLAG_ACTIVE={0x4}, @NL80211_MNTR_FLAG_OTHER_BSS={0x4}, @NL80211_MNTR_FLAG_PLCPFAIL={0x4}]}], @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}]}, 0x114}, 0x1, 0x0, 0x0, 0x8004}, 0x20000000) preadv(r2, &(0x7f0000002600)=[{&(0x7f0000000340)=""/255, 0xff}, {&(0x7f0000000440)=""/159, 0x9f}, {&(0x7f0000000500)=""/211, 0xd3}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000001600)=""/4096, 0x1000}], 0x5, 0x2, 0x3) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000002a40)={&(0x7f0000002680)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000002a00)={&(0x7f00000026c0)={0x30c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x80}, @ETHTOOL_A_LINKMODES_OURS={0x1dc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x59, 0x5, "3c1008d1d9a85d9a016ccb8ad7fccda21fe7c1cd6b02e87c9cfd95f65397cbffcd74ef698d5a8e5500bea9ebe062c8fdb27e7d71573996650eea687488f92c57f3f9443f6399d5266c404f7b85d7435c700b5f9f15"}, @ETHTOOL_A_BITSET_BITS={0x2c, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '+\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}]}, @ETHTOOL_A_BITSET_BITS={0x88, 0x3, 0x0, 0x1, [{0x4}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '/\',:*\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x800}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\xd2^}\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '\xd8#\'-&/\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1b}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'nl80211\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0xb9, 0x4, "b8cd5bcd366818d85b2dcbd3c4987c624a61d24cef8fb33bed98879cc5327b9a477df94c5ba22f8a07175170f63ea04aa143d5a87a65d6e96e521a65e7d1f2578eceaecc13001cd41bd8de240401db7f50d0ea0dde608c81a26807a1211dab6d1ff27972c2641ac3249a181574a324d341155dd12881f80dc2591cff60e51b2e8a849448e5bbd74c7676b969b849f4a1a794715e675437d9e5671221de129f61d8d052994511b63cbefbd1c0af5b04b21abe945717"}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5}, @ETHTOOL_A_LINKMODES_OURS={0xd8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4d, 0x4, "fca8c41a49404d2a4902a98f05e68b69fa1dc79b3186a0ef60d4968886a20db56cde3d8b90cc4a0af29f8e7ac456650cf07083dcc8941d40cdec1b32c074475c3a2397de3e39f280b9"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x61, 0x4, "1f3dd615239a5b29ce32127dc7c14b0bbde4956d512fa02981ad6a408827f7d72e2204b8294f4f457a50bb25a1c657407f6ef1ff4a64547d6056932d5b193effa120108bff89c28274accebff313625c03112609a457b71cd3141df2ef"}, @ETHTOOL_A_BITSET_MASK={0xc, 0x5, "7cbc5c6bd2cbfac2"}, @ETHTOOL_A_BITSET_BITS={0x10, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}]}, 0x30c}, 0x1, 0x0, 0x0, 0x50}, 0x804) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, &(0x7f0000002a80)={r0, 0x5, 0x7fffffff}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002b00), 0xffffffffffffffff) sendmsg$NL80211_CMD_FLUSH_PMKSA(0xffffffffffffffff, &(0x7f0000002bc0)={&(0x7f0000002ac0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000002b80)={&(0x7f0000002b40)={0x1c, r4, 0x200, 0x70bd28, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8110}, 0x44000) recvmmsg(0xffffffffffffffff, &(0x7f0000002f80)=[{{&(0x7f0000002c00)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000002f40)=[{&(0x7f0000002c80)=""/171, 0xab}, {&(0x7f0000002d40)=""/10, 0xa}, {&(0x7f0000002d80)=""/156, 0x9c}, {&(0x7f0000002e40)=""/196, 0xc4}], 0x4}, 0x6}], 0x1, 0x0, &(0x7f0000002fc0)) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000030c0), 0x20001, 0x0) perf_event_open(&(0x7f0000003040)={0x1, 0x80, 0xff, 0x43, 0xdc, 0x40, 0x0, 0x9, 0x8000, 0xd, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000003000), 0x2}, 0x400, 0x8, 0x4, 0x4, 0x6, 0x0, 0x2, 0x0, 0x3, 0x0, 0x100000000}, 0xffffffffffffffff, 0xf, r5, 0x8) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000003100), 0x2a42, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000003140)={{0x1, 0x1, 0x18, r6, {0x3fffc000}}, './file0\x00'}) ioctl$PIO_FONTX(r5, 0x4b6c, &(0x7f0000003580)={0x1e6, 0x1b, &(0x7f0000003180)="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"}) pipe2(&(0x7f00000035c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) sendmsg$TIPC_NL_NET_SET(r7, &(0x7f0000003740)={&(0x7f0000003600)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000003700)={&(0x7f0000003640)={0xa4, 0x0, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x54, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x45, 0x4, {'gcm(aes)\x00', 0x1d, "954649f2e6e05a55d7dca6c112efaeaea0b1bdf35d13d63bf03502767e"}}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x401}]}, @TIPC_NLA_PUBL={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x4}, @TIPC_NLA_PUBL_TYPE={0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x2}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x100}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x10001}, @TIPC_NLA_PUBL_UPPER={0x8}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x40080}, 0x44880) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r7, &(0x7f0000003840)={&(0x7f0000003780)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000003800)={&(0x7f00000037c0)={0x1c, 0x0, 0xb00, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4049000}, 0x48840) sendmsg$TIPC_NL_KEY_FLUSH(r8, &(0x7f0000003980)={&(0x7f0000003880)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000003940)={&(0x7f00000038c0)={0x64, 0x0, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x50, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x8060) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000003a00)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7}}, './file0\x00'}) 01:41:02 executing program 5: ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000000)) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000080)) pread64(r0, &(0x7f00000000c0)=""/225, 0xe1, 0x3) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000001c0)={{0x3, 0x3, 0x0, 0x2, 0x8}}) pread64(r0, &(0x7f0000000200)=""/70, 0x46, 0x2) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000280)={{0x0, 0x2, 0x7f, 0x3, 0xffffffff}}) r1 = openat$incfs(0xffffffffffffffff, &(0x7f00000002c0)='.pending_reads\x00', 0x442001, 0x2c) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000300)={{0x3, 0x3, 0x7, 0x1, 0x200}}) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/module/module', 0x101002, 0x53) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000380)={{0x1, 0x2, 0x1f, 0x1, 0x1547}}) r3 = fsmount(r2, 0x0, 0xfc) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0), 0x20002, 0x0) ioctl$FIONCLEX(r4, 0x5450) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r2, 0xc08c5336, &(0x7f0000000400)={0x7f, 0xfffffffa, 0x0, 'queue1\x00', 0x4}) r5 = openat2(r3, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x400540, 0x1a0, 0xfc066634d565cd6}, 0x18) flistxattr(r5, &(0x7f0000000540)=""/207, 0xcf) r6 = mq_open(&(0x7f0000000640)=':-.)#g&\x00', 0x80, 0x1, &(0x7f0000000680)={0x9a1, 0x1, 0xfffffffffffffffd, 0xfffffffffffffeff}) signalfd4(r6, &(0x7f00000006c0)={[0x7faaf997]}, 0x8, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0x40345410, &(0x7f0000000700)={{0x2, 0x3, 0x8, 0x2, 0x100}}) 01:41:02 executing program 2: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x12, 0x13, [{0x0, 0x1}, {0x12, 0x1}, {}, {0x60}, {0x18, 0x1}, {0x77}, {0x36}, {0x6, 0x1}, {0x1, 0x1}, {0x30, 0x1}, {0x9}, {0x1b, 0x1}, {0x36}, {0x9}]}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x36}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x648000, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340), r1) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r4, 0x4, 0x70bd27, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}}, 0x4000000) r5 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NL80211_CMD_GET_SURVEY(r5, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r2, 0x303, 0x70bd25, 0x25dfdbff, {{}, {@void, @void}}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4001}, 0x2400a081) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000680)={'gre0\x00', &(0x7f00000005c0)={'tunl0\x00', 0x0, 0x10, 0x40, 0x5, 0x3f, {{0x26, 0x4, 0x0, 0x9, 0x98, 0x66, 0x0, 0x1f, 0x2f, 0x0, @multicast2, @remote, {[@timestamp={0x44, 0xc, 0xa9, 0x0, 0x8, [0x0, 0x6]}, @generic={0x82, 0xb, "3854b1fd2466626f14"}, @noop, @ssrr={0x89, 0xb, 0x4d, [@multicast1, @multicast2]}, @cipso={0x86, 0xd, 0xffffffffffffffff, [{0x2, 0x5, "0c16fa"}, {0x2, 0x2}]}, @generic={0x89, 0x9, "cac9a8c959016e"}, @ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x13, 0xfb, [@private=0xa010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x3f}]}, @lsrr={0x83, 0x13, 0xa6, [@multicast1, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x1f, 0x5e, [@remote, @empty, @private=0xa010102, @multicast1, @multicast2, @loopback, @loopback]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000800)={&(0x7f00000006c0)={0x104, r6, 0x408, 0x70bd2d, 0x25dfdbfc, {}, [@HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x40085}, 0x8800) r8 = syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) preadv(r8, &(0x7f0000001ec0)=[{&(0x7f0000000ac0)=""/30, 0x1e}, {&(0x7f0000000b00)=""/235, 0xeb}, {&(0x7f0000000c00)=""/166, 0xa6}, {&(0x7f0000000cc0)}, {&(0x7f0000000d00)=""/42, 0x2a}, {&(0x7f0000000d40)=""/223, 0xdf}, {&(0x7f0000000e40)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/89, 0x59}], 0x8, 0x1, 0xfff) r9 = creat(&(0x7f0000001f40)='./file0\x00', 0x108) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r9, 0xc018937d, &(0x7f0000001f80)={{0x1, 0x1, 0x18, r8, {0x1}}, './file0\x00'}) sendmsg$NL80211_CMD_FRAME(r10, &(0x7f00000020c0)={&(0x7f0000001fc0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000002080)={&(0x7f0000002000)={0x70, r2, 0x4, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_FRAME={0x1f, 0x33, @action_no_ack={@wo_ht={{0x0, 0x0, 0xe, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, {0x1f}, @broadcast, @broadcast, @from_mac=@broadcast, {0x5, 0x6}}, @smps}}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x16c1}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x9}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x29}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0xa21}], @NL80211_ATTR_DONT_WAIT_FOR_ACK={0x4}, @NL80211_ATTR_DURATION={0x8, 0x57, 0xe83}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}]}, 0x70}}, 0x4000000) r11 = openat(r3, &(0x7f0000002100)='./file0/file0\x00', 0x2200, 0xab) sendfile(r1, r11, &(0x7f0000002140)=0x2, 0x0) 01:41:02 executing program 6: ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0xc020662a, &(0x7f0000000000)={0xffffffff, 0x2, 0x4, 0xdf, 0x2, [{0x1, 0x9, 0x400, '\x00', 0x8}, {0x1, 0x13, 0x9, '\x00', 0x102}]}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0), 0xd0482, 0x0) ioctl$BTRFS_IOC_GET_FEATURES(r0, 0x80189439, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = accept4$unix(r2, &(0x7f0000000180)=@abs, &(0x7f0000000200)=0x6e, 0x80000) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x1b5717b0}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r4, 0xc0189371, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r4, 0xc0189371, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$HIDIOCGRDESCSIZE(r4, 0x80044801, &(0x7f0000000300)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f0000000380)=0x0) sendfile(r5, r0, &(0x7f00000003c0)=0x4, 0x8) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r4, 0x50009418, &(0x7f0000000480)={{r4}, r7, 0x2, @inherit={0x78, &(0x7f0000000400)={0x0, 0x6, 0x9, 0x0, {0x0, 0x8, 0x9, 0x3f, 0x6}, [0x85c, 0x0, 0x8, 0xfffffffffffffffb, 0x2, 0x2]}}, @name="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"}) mount$cgroup(0x0, &(0x7f0000001480)='./file0\x00', &(0x7f00000014c0), 0x4, &(0x7f0000001500)={[{@noprefix}, {@cpuset_v2_mode}, {@xattr}], [{@obj_type={'obj_type', 0x3d, '/dev/autofs\x00'}}, {@smackfsfloor}, {@obj_role={'obj_role', 0x3d, '/dev/autofs\x00'}}, {@euid_gt={'euid>', 0xee01}}, {@pcr={'pcr', 0x3d, 0xd}}, {@obj_role={'obj_role', 0x3d, '!\\.-:}'}}]}) ioctl$BTRFS_IOC_SYNC(r3, 0x9408, 0x0) removexattr(&(0x7f00000015c0)='./file0/file0\x00', &(0x7f0000001600)=@random={'security.', '/dev/autofs\x00'}) accept4$unix(r4, &(0x7f0000001640), &(0x7f00000016c0)=0x6e, 0x800) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000001700)) 01:41:02 executing program 3: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, &(0x7f0000000000)) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(0xffffffffffffffff, 0x8010671f, &(0x7f00000000c0)={&(0x7f0000000080)=""/21, 0x15}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x480, 0x100) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140), 0x101000, 0x0) inotify_add_watch(r1, &(0x7f0000000180)='./file0\x00', 0x200) r2 = openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x8c42c0, 0x11) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x547a01, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r3, 0xc05c5340, &(0x7f0000000240)={0x1f, 0x0, 0x2, {0x7fff, 0x80}, 0x9, 0xffffff00}) inotify_add_watch(r1, &(0x7f00000002c0)='./file1\x00', 0x8) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0, {0xee01, 0xffffffffffffffff}}, './file0\x00'}) r5 = syz_open_dev$vcsn(&(0x7f0000000680), 0x3, 0x0) r6 = openat$incfs(r3, &(0x7f0000000700)='.pending_reads\x00', 0x400, 0x102) io_submit(0x0, 0x5, &(0x7f00000007c0)=[&(0x7f0000000400)={0x0, 0x0, 0x0, 0x1, 0xfdd9, r1, &(0x7f0000000300)="c53ae23eaf95cf9d4995870347edf0c24058e784497364e9b043706e44687fee87987d36d13a32508cbe4b8459f465cfeffdf58f603fde930c10c50cdd4ad4ef1deec71a6218c2c32e2d1563af630eab025543627af0d8ae1b3ee2769d5e068949f94ff4c484abb6868674a083322f62852369ac588e7c028a45a3c5b4cf1739f0398fa9508eb5ba6a246b7d531878d3af2bc26e094cd099656dbf9d1749bc73d74e97d5a6770e2c8d0ac188f46b64d78a5098a78f754a4b7af627ef95b6927d25adc47e79e57b6dbc6212cc96054da56d6fbed0", 0xd4, 0xffffffffffffdb52, 0x0, 0x0, r1}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x8, 0x438f, r0, &(0x7f0000000440)="a37afc1ce4eb41b97cfc257824d0ab7b4323", 0x12, 0x1, 0x0, 0x0, r4}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x3, 0x7fff, r2, &(0x7f0000000500)="2da14b40d6196a092a57469f356f07c1bd7c52f08539178cc403da56b6ddf8bbada0fd8a665a54c3a7642a072ae7e7e6ece9a086ce7fb33a4aa85e0e6b3dfb055a780f922a2558d9906fb943fe43e816a11d1cc2bce74a1367f6b55bea2b8ab38553f8", 0x63, 0x0, 0x0, 0x3, r1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0xf8c46900cebe30f8, 0x3, r0, &(0x7f00000005c0)="6a14440b9531b5fc569e956e9da841f015aa8eaa22a21cdea693af547eba9c812e54f5a73f68dcf563c097f611a0d507d3c83b35d45f369832d198b27475be76ba4f5c1e0b6572e73cdb275cac2b07975cf8e31693fc7ec7991a488650c7f4291695a3df287cf55faca23a31e33f3d6707ba10150a871af7a58f011bd629b429f6fc722ddb87f75e909f1a09b4d55a8bdd9da4cebbfc068881d3dabf3d74ebd5994b9266d66e8467d65708b204c608f4e3685fa3cbf5586e9ff26904ece5a034", 0xc0, 0x9, 0x0, 0x3, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x8, 0x1, r6, &(0x7f0000000740)="2f403ebd2cbcdf455d776b5fea66080216018e2cf34a1dfaf1b4b44d0abd810cc45e0a23c05a", 0x26, 0x3, 0x0, 0x3}]) ioctl$F2FS_IOC_MOVE_RANGE(r4, 0xc020f509, &(0x7f0000000800)={0xffffffffffffffff, 0x6f4, 0x7, 0x7}) sendmsg$nl_netfilter(r7, &(0x7f0000001ac0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001a80)={&(0x7f0000000880)={0x11d8, 0xa, 0xa, 0x801, 0x70bd25, 0x25dfdbfc, {0x0, 0x0, 0x9}, [@typed={0xc, 0x73, 0x0, 0x0, @u64=0x81}, @nested={0x11b5, 0x5c, 0x0, 0x1, [@generic="66647129fba4ffe98a1eb9d6671a2361c3d06d409844b85d722e442c406935280bd55486806b703c606f111bebc2f70309e6d6b265fdb67ceedbf94818146b449a93fd6c63c28c1dac2822fe6be13fc2b8e2f4204e3c25421754137551fd567796", @typed={0x8, 0x2b, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0x1004, 0x8, 0x0, 0x0, @binary="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"}, @generic="e4cd8400d04a9cebc7288a4bf28602d801fb303e1e66873a2e55843354d2af78458cc4343baae94888c6876e2f6eb0e9ae061851868607c987b36a032646efc3ebf7c50a17a965523fa1c00c021734c0d498c26de6c65c3a46ab34f9995f411edae3cc1e77859e135e024c36cdeb45d9346f447a35dab014dad3dc4629e7a272e54e9d9f3ff2fdd293d50003b718c6670a9cc828c7e61452ab5d53cc1f800baa264c595b", @typed={0xc, 0x3c, 0x0, 0x0, @u64}, @typed={0xc, 0x27, 0x0, 0x0, @u64=0x8}, @typed={0x87, 0x1c, 0x0, 0x0, @binary="03c4d8011538b692aad134555e5f51a299e2d1bc60d3e74e5910422f7d902fe0724403e02c551e44f4f2a1ec4e315347ccdde7caac19faa087f1e3da2bdeb570fc01580e91305738c4939cd8d7d4c353ef2aef3a1943c94589726297e3211935f7c7d5ede74fb1dd4c8dfa628899de734eb5b58b876bee360cef04f0aba88bca667aaa"}]}]}, 0x11d8}, 0x1, 0x0, 0x0, 0x8010}, 0x0) r8 = openat$hpet(0xffffffffffffff9c, &(0x7f0000001b00), 0xc0, 0x0) sendmsg$NL80211_CMD_FRAME(r8, &(0x7f0000001c80)={&(0x7f0000001b40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001c40)={&(0x7f0000001b80)={0x8c, 0x0, 0x800, 0x70bd28, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_CSA_C_OFFSETS_TX={0x12, 0xcd, [0xed, 0x7, 0x3, 0xec1, 0x1, 0x5, 0x6]}, @chandef_params=[@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}, @NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_DONT_WAIT_FOR_ACK={0x4}, @NL80211_ATTR_CSA_C_OFFSETS_TX={0x12, 0xcd, [0x2, 0x5, 0x1f, 0x1ff, 0x7ff, 0x3, 0x8]}, @chandef_params=[@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x6}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x4}], @NL80211_ATTR_DURATION={0x8, 0x57, 0xaee}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}, @NL80211_ATTR_CSA_C_OFFSETS_TX={0x14, 0xcd, [0x2, 0x101, 0x8, 0xf81, 0xfffb, 0x5, 0x31fb, 0x80]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x4}, 0x4008000) open(&(0x7f0000001cc0)='./file1\x00', 0x200200, 0x4c) r9 = pidfd_getfd(r6, r8, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r9, 0x80045300, &(0x7f0000001d00)) 01:41:02 executing program 7: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000001540)={&(0x7f0000000040)={0x1500, 0x14, 0x4, 0x101, 0x70bd2a, 0x25dfdbfe, {0x2, 0x0, 0x3}, [@nested={0x1260, 0x29, 0x0, 0x1, [@generic="0121094d830eef9e83a5377c0a4259dd236558743006a12d71a30d4f19d36872f012d4729e91a90d85fa4c70f2ae562e918a76e520b19bdf3e840817ae874cb3d41b9452718af01d745901acfd2cc92d6aa5a196b9ecfeecbaabe66c9a36041e9c446234a2802eb1136f7dbb5ed57ac0a22d0a6638dd36e85e2acaab35ecc9455d98f0b170853f31fe61b462cdfd481496123b0293a591bf3fbd4b4496141b87c290aadabdb5c7a7bf80d3e70d1542e88dbbed0a9002", @generic="1077293f60d3e0b2e162b1a6b8f22ec3119587b307066710", @typed={0x7, 0x12, 0x0, 0x0, @str='@,\x00'}, @generic="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", @generic="c23aea2fbd90f3e025143b16531875be8e069aad73da7799ad97268f44276a88f5ff9d2c54ae8670bc08e716036641915f661fb6689651c598a3d71e5455998897d2f3f38eeb5a7131dc57e81a59cb6ce5ccfd88b313395fcc2d818161f47a37bcd253690e529133cfcfdff46a4c", @generic="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", @typed={0x8, 0x5b, 0x0, 0x0, @fd}, @typed={0xc, 0x82, 0x0, 0x0, @u64=0xffffffff}, @typed={0x8, 0x76, 0x0, 0x0, @ipv4=@multicast1}]}, @nested={0x1ff, 0x8e, 0x0, 0x1, [@typed={0x14, 0x14, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, '\x00', 0x1e}}, @generic="1911d88cc036a1e24d88ddaf70c9411a30eda226b59eeec2b7325b2de85253c904d30e053499185a25cfb22e745de60c8c5e81fe5bb588f8fdd81bbff3f660e78352262f5ac90788a39d61405ac480d75bc8eebba95610adb47cf9c297ebea8449e0ef2c24a56b6b627d961e77f12ba9756f267fba83919b069262fe8292f5fc5320385698e5f1a85482b857887c40586d92f2997cc4760047b98f64b970780d09d3ccd43e71331071837692dd82657552eb02e588308b838bf61b2f5fb8689a97a3d21bc397fa59fe0eac44a3751cce34c0385b50695f0be1b94faa891640cd", @typed={0x8, 0xe, 0x0, 0x0, @ipv4=@remote}, @generic="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"]}, @generic="c088ea11226489eae29e953d90c90236f72de92968789433565960fa894c2cb805b58e209834fe3e823655829cb08a562f8c415097ba2f0e2e0ef9514e422faa8be7bed900245b166d0f634643b1ec6ef0b1b7fcf86288aa7ddcbe8530135f4aecbca7dcd5fa0e9268f6eab8ca5e722aa07a4026ddfcee6d6bdbc50601e9728d73052ff9a25d5cc18f"]}, 0x1500}}, 0x4000) sendmsg$IPSET_CMD_GET_BYINDEX(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f00000015c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000001680)={&(0x7f0000001600)={0x44, 0xf, 0x6, 0x5, 0x0, 0x0, {0x7, 0x0, 0x7}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x2}, @IPSET_ATTR_INDEX={0x6, 0xb, 0xffffffffffffffff}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x48001}, 0x10) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001840)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000001800)={&(0x7f0000001740)={0xac, 0x0, 0x2, 0x801, 0x0, 0x0, {0x2, 0x0, 0x2}, [@CTA_EXPECT_HELP_NAME={0x5, 0x6, '\x00'}, @CTA_EXPECT_FN={0x8, 0xb, 'sip\x00'}, @CTA_EXPECT_HELP_NAME={0xa, 0x6, 'Q.931\x00'}, @CTA_EXPECT_MASTER={0x68, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x844cf3f81737d9d1}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0={0xfc, 0x0, '\x00', 0x20}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @empty}}}]}, @CTA_EXPECT_NAT={0x14, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_DIR={0x8}]}]}, 0xac}}, 0x8010) pipe2(&(0x7f0000001880)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r2 = syz_genetlink_get_family_id$gtp(&(0x7f0000001900), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000001a00)={&(0x7f00000018c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000019c0)={&(0x7f0000001940)={0x54, r2, 0x20, 0x70bd2d, 0x25dfdbfe, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @initdev={0xac, 0x1e, 0x0, 0x0}}, @GTPA_LINK={0x8}, @GTPA_TID={0xc, 0x3, 0x4}, @GTPA_MS_ADDRESS={0x8, 0x5, @rand_addr=0x64010102}, @GTPA_FLOW={0x6, 0x6, 0x3}, @GTPA_TID={0xc, 0x3, 0x4}, @GTPA_PEER_ADDRESS={0x8, 0x4, @local}]}, 0x54}, 0x1, 0x0, 0x0, 0x1}, 0x10) write$binfmt_aout(r1, &(0x7f0000001a40)={{0x108, 0x3b, 0x6b, 0x1eb, 0x33e, 0x3, 0xf7, 0x362}, "ddbbca97d94695afd238c5155952b88c4ad1b4434941090d8411122a89aba2ea3a19c25cdddbaa9f312f9da070fb70eba27adf7951354333786f431528635f86ced3f723a3a7af5f946caf10aca90d8335138c1d78ecfac64b5d1e47c8b2107b05d396515c1e429f0a25436ae71714fee1595e445c3dc1932ecc8229721e60fc824053948c80d36b9b25b52b17ba30848c8b69f2645f67f17c8f0d9aef32914b06babb1a9710847e73a64cef3de2762b6b465c64cd7fd4387dc93177ee", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xadd) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(0xffffffffffffffff, &(0x7f0000002640)={&(0x7f0000002540)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000002600)={&(0x7f0000002580)={0x5c, 0x0, 0x4, 0x70bd29, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x4}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7d}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x39}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x52}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x27}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x76}]}, 0x5c}}, 0x11) socketpair(0x15, 0x2, 0x2de3, &(0x7f0000002680)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002700), r0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000002740)={'wlan1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000002780)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000002840)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000002800)={&(0x7f00000027c0)={0x40, r4, 0x100, 0x70bd2c, 0x25dfdbfc, {{}, {@val={0x8, 0x1, 0x75}, @val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x8, 0x65}}}}, [@NL80211_ATTR_NETNS_FD={0x8, 0xdb, r1}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r6}]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x8001) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000002880)=@IORING_OP_FALLOCATE={0x11, 0x0, 0x0, @fd=r0, 0x10001, 0x0, 0x9, 0x0, 0xe92d3d0c6d03d4da, {0x0, r7}}, 0x231) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000002900)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f00000029c0)={&(0x7f00000028c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000002980)={&(0x7f0000002940)={0x2c, r4, 0x200, 0x70bd29, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r8}, @val={0xc, 0x99, {0x61ee, 0x10}}}}, [@NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) r9 = fsmount(r0, 0x0, 0x2) syz_io_uring_setup(0x7b92, &(0x7f0000002a00)={0x0, 0x2c37, 0x2, 0x1, 0xc9, 0x0, r9}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000002a80), &(0x7f0000002ac0)) [ 91.957450] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 91.959436] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 91.961492] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 91.963378] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 91.964508] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 91.965962] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 91.967272] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 91.968817] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 91.970696] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 91.994366] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 91.995823] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 91.998950] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 92.000595] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 92.005140] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 92.009273] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 92.010832] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 92.013430] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 92.014573] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 92.015904] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 92.016966] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 92.018122] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 92.019894] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 92.025444] Bluetooth: hci1: HCI_REQ-0x0c1a [ 92.028901] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 92.030591] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 92.031833] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 92.032968] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 92.035047] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 92.036143] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 92.038638] Bluetooth: hci2: HCI_REQ-0x0c1a [ 92.042753] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 92.042826] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 92.050015] Bluetooth: hci0: HCI_REQ-0x0c1a [ 92.053582] Bluetooth: hci3: HCI_REQ-0x0c1a [ 92.073519] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 92.074894] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 92.075999] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 92.077113] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 92.080079] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 92.081809] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 92.086966] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 92.089552] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 92.089648] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 92.091231] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 92.093745] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 92.095642] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 92.097049] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 92.098616] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 92.100068] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 92.101856] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 92.103442] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 92.105082] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 92.108577] Bluetooth: hci4: HCI_REQ-0x0c1a [ 92.117500] Bluetooth: hci7: HCI_REQ-0x0c1a [ 92.119155] Bluetooth: hci5: HCI_REQ-0x0c1a [ 92.122520] Bluetooth: hci6: HCI_REQ-0x0c1a [ 94.083825] Bluetooth: hci1: command 0x0409 tx timeout [ 94.084352] Bluetooth: hci2: command 0x0409 tx timeout [ 94.085121] Bluetooth: hci3: command 0x0409 tx timeout [ 94.087603] Bluetooth: hci0: command 0x0409 tx timeout [ 94.147243] Bluetooth: hci7: command 0x0409 tx timeout [ 94.147304] Bluetooth: hci4: command 0x0409 tx timeout [ 94.147812] Bluetooth: hci6: command 0x0409 tx timeout [ 94.149732] Bluetooth: hci5: command 0x0409 tx timeout [ 96.131253] Bluetooth: hci0: command 0x041b tx timeout [ 96.131763] Bluetooth: hci3: command 0x041b tx timeout [ 96.132627] Bluetooth: hci2: command 0x041b tx timeout [ 96.133071] Bluetooth: hci1: command 0x041b tx timeout [ 96.195534] Bluetooth: hci5: command 0x041b tx timeout [ 96.196090] Bluetooth: hci6: command 0x041b tx timeout [ 96.197256] Bluetooth: hci4: command 0x041b tx timeout [ 96.197712] Bluetooth: hci7: command 0x041b tx timeout [ 98.179466] Bluetooth: hci1: command 0x040f tx timeout [ 98.180364] Bluetooth: hci2: command 0x040f tx timeout [ 98.181216] Bluetooth: hci3: command 0x040f tx timeout [ 98.182115] Bluetooth: hci0: command 0x040f tx timeout [ 98.243315] Bluetooth: hci7: command 0x040f tx timeout [ 98.244430] Bluetooth: hci4: command 0x040f tx timeout [ 98.246954] Bluetooth: hci6: command 0x040f tx timeout [ 98.250493] Bluetooth: hci5: command 0x040f tx timeout [ 100.228231] Bluetooth: hci0: command 0x0419 tx timeout [ 100.228681] Bluetooth: hci3: command 0x0419 tx timeout [ 100.229102] Bluetooth: hci2: command 0x0419 tx timeout [ 100.230007] Bluetooth: hci1: command 0x0419 tx timeout [ 100.292215] Bluetooth: hci5: command 0x0419 tx timeout [ 100.292640] Bluetooth: hci6: command 0x0419 tx timeout [ 100.293008] Bluetooth: hci4: command 0x0419 tx timeout [ 100.295192] Bluetooth: hci7: command 0x0419 tx timeout 01:41:27 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x800008) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x111000, 0x0) ioctl$TIOCGPTPEER(r1, 0x5441, 0x2) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x80) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$TIOCGPTPEER(r2, 0x5441, 0x7) ioctl$TCSETS(r0, 0x5404, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "e7e8f9d0373fb8613645667a00"}) 01:41:27 executing program 3: r0 = syz_open_dev$vcsu(&(0x7f0000001640), 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x488900, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$sock_int(r2, 0x1, 0x28, &(0x7f00000001c0), 0x4) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f0000000100)={'syztnl1\x00', &(0x7f0000000080)={'syztnl1\x00', r5, 0x29, 0x2, 0x9, 0x80000001, 0x5d, @loopback, @private2={0xfc, 0x2, '\x00', 0x1}, 0x700, 0x1, 0x4, 0x1f}}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {r0}}, './file0\x00'}) 01:41:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x20000000) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000003c0)={'veth0_to_batadv\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$sock_int(r2, 0x1, 0x23, &(0x7f00000001c0), 0x4) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000001, 0x1010, r1, 0x10000000) syz_io_uring_submit(0x0, r3, &(0x7f0000000680)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, r2, 0x0, &(0x7f0000000640)={&(0x7f00000000c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/79, 0x4f}, {&(0x7f0000000200)=""/52, 0x34}, {&(0x7f0000000240)}, {&(0x7f0000000280)=""/41, 0x29}, {&(0x7f00000002c0)=""/104, 0x68}, {&(0x7f0000000340)=""/104, 0x68}, {&(0x7f00000003c0)}, {&(0x7f0000000400)=""/58, 0x3a}, {&(0x7f0000000440)=""/121, 0x79}], 0x9, &(0x7f0000000580)=""/143, 0x8f}, 0x0, 0x10000, 0x1, {0x1}}, 0x10000) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r2) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000240)={@dev={0xac, 0x14, 0x14, 0x44}, @local, r4}, 0xc) ioctl$EXT4_IOC_GET_ES_CACHE(r1, 0xc020662a, &(0x7f00000006c0)={0x0, 0xb6b4, 0x8, 0x0, 0x2, [{0x1f8, 0x9, 0xfff, '\x00', 0x1102}, {0xfff, 0xfffffffffffffffa, 0x9, '\x00', 0x100}]}) 01:41:27 executing program 3: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000180)={0xffffffffffffffff, 0xfffffffffffffff8, 0xfffffffffffffffc, 0xfffffffffffffff7}) writev(0xffffffffffffffff, &(0x7f0000001880)=[{&(0x7f0000000480)="9b3e", 0x2}], 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000640)=ANY=[@ANYBLOB="01000000010000001c0000005f4e817f3fc6941b5f92d0b33b95bbdabd2db248b47b218c8f1a2f4075a41211fa1945bbbf1db08e3a8fa3a659454bed207f90e7c091f2535db3a95ff481a828a3953e90bb80eddabe5e650d0655ee96c16143f9f34ca13cbfd6ca8020621115a73fae4391515d90e254926d9aaa54d657c3f6c6d5fac7164e66ebdf2ed36e36cbaa05967aec7c09954ac847239c524ec3bbe8efb3eab82b1a583a5d3feaf7af27271a11cbaf0903d39c610f098ca7ab14e277a355c747b16c542251207cbee3442eb9bedabb9abadc163039ec48ad6dea6730c9e09a49ddd0b55791f4c2eebf8d5826b7ccf3bd3dd5b6889159050bac6c16020830cc9a", @ANYRES32, @ANYBLOB="40001ce2f4400000bbbfba892f66d28af9749dca696c"]) fallocate(r1, 0x0, 0x0, 0x87ffffc) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x5e948dc66b3ce8a1, 0x0, 0xfffffffe}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0x10) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r4, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000380)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, 0x80000, 0x1, {0x0, r5}}, 0x7f) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$sock_int(r6, 0x1, 0x28, &(0x7f00000001c0), 0x4) syz_io_uring_submit(0x0, r3, &(0x7f0000000540)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r6, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000300)=[{&(0x7f00000001c0)=""/54, 0x36}, {&(0x7f00000004c0)=""/118, 0x76}, {&(0x7f0000000580)=""/133, 0x85}], 0x3}, 0x0, 0x40000000, 0x0, {0x3, r5}}, 0x5) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) [ 116.162590] audit: type=1400 audit(1660873287.703:7): avc: denied { open } for pid=3864 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 116.164211] audit: type=1400 audit(1660873287.703:8): avc: denied { kernel } for pid=3864 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 116.233960] audit: type=1400 audit(1660873287.774:9): avc: denied { write } for pid=3864 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 116.247484] ======================================================= [ 116.247484] WARNING: The mand mount option has been deprecated and [ 116.247484] and is ignored by this kernel. Remove the mand [ 116.247484] option from the mount to silence this warning. [ 116.247484] ======================================================= [ 116.259112] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value [ 116.287170] hrtimer: interrupt took 19126 ns [ 116.303365] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:41:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x20000000) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000003c0)={'veth0_to_batadv\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$sock_int(r2, 0x1, 0x23, &(0x7f00000001c0), 0x4) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000001, 0x1010, r1, 0x10000000) syz_io_uring_submit(0x0, r3, &(0x7f0000000680)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, r2, 0x0, &(0x7f0000000640)={&(0x7f00000000c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/79, 0x4f}, {&(0x7f0000000200)=""/52, 0x34}, {&(0x7f0000000240)}, {&(0x7f0000000280)=""/41, 0x29}, {&(0x7f00000002c0)=""/104, 0x68}, {&(0x7f0000000340)=""/104, 0x68}, {&(0x7f00000003c0)}, {&(0x7f0000000400)=""/58, 0x3a}, {&(0x7f0000000440)=""/121, 0x79}], 0x9, &(0x7f0000000580)=""/143, 0x8f}, 0x0, 0x10000, 0x1, {0x1}}, 0x10000) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r2) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000240)={@dev={0xac, 0x14, 0x14, 0x44}, @local, r4}, 0xc) ioctl$EXT4_IOC_GET_ES_CACHE(r1, 0xc020662a, &(0x7f00000006c0)={0x0, 0xb6b4, 0x8, 0x0, 0x2, [{0x1f8, 0x9, 0xfff, '\x00', 0x1102}, {0xfff, 0xfffffffffffffffa, 0x9, '\x00', 0x100}]}) 01:41:27 executing program 2: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x12, 0x13, [{0x0, 0x1}, {0x12, 0x1}, {}, {0x60}, {0x18, 0x1}, {0x77}, {0x36}, {0x6, 0x1}, {0x1, 0x1}, {0x30, 0x1}, {0x9}, {0x1b, 0x1}, {0x36}, {0x9}]}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x36}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x648000, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340), r1) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r4, 0x4, 0x70bd27, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}}, 0x4000000) r5 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NL80211_CMD_GET_SURVEY(r5, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r2, 0x303, 0x70bd25, 0x25dfdbff, {{}, {@void, @void}}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4001}, 0x2400a081) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000680)={'gre0\x00', &(0x7f00000005c0)={'tunl0\x00', 0x0, 0x10, 0x40, 0x5, 0x3f, {{0x26, 0x4, 0x0, 0x9, 0x98, 0x66, 0x0, 0x1f, 0x2f, 0x0, @multicast2, @remote, {[@timestamp={0x44, 0xc, 0xa9, 0x0, 0x8, [0x0, 0x6]}, @generic={0x82, 0xb, "3854b1fd2466626f14"}, @noop, @ssrr={0x89, 0xb, 0x4d, [@multicast1, @multicast2]}, @cipso={0x86, 0xd, 0xffffffffffffffff, [{0x2, 0x5, "0c16fa"}, {0x2, 0x2}]}, @generic={0x89, 0x9, "cac9a8c959016e"}, @ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x13, 0xfb, [@private=0xa010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x3f}]}, @lsrr={0x83, 0x13, 0xa6, [@multicast1, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x1f, 0x5e, [@remote, @empty, @private=0xa010102, @multicast1, @multicast2, @loopback, @loopback]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000800)={&(0x7f00000006c0)={0x104, r6, 0x408, 0x70bd2d, 0x25dfdbfc, {}, [@HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x40085}, 0x8800) r8 = syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) preadv(r8, &(0x7f0000001ec0)=[{&(0x7f0000000ac0)=""/30, 0x1e}, {&(0x7f0000000b00)=""/235, 0xeb}, {&(0x7f0000000c00)=""/166, 0xa6}, {&(0x7f0000000cc0)}, {&(0x7f0000000d00)=""/42, 0x2a}, {&(0x7f0000000d40)=""/223, 0xdf}, {&(0x7f0000000e40)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/89, 0x59}], 0x8, 0x1, 0xfff) r9 = creat(&(0x7f0000001f40)='./file0\x00', 0x108) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r9, 0xc018937d, &(0x7f0000001f80)={{0x1, 0x1, 0x18, r8, {0x1}}, './file0\x00'}) sendmsg$NL80211_CMD_FRAME(r10, &(0x7f00000020c0)={&(0x7f0000001fc0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000002080)={&(0x7f0000002000)={0x70, r2, 0x4, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_FRAME={0x1f, 0x33, @action_no_ack={@wo_ht={{0x0, 0x0, 0xe, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, {0x1f}, @broadcast, @broadcast, @from_mac=@broadcast, {0x5, 0x6}}, @smps}}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x16c1}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x9}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x29}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0xa21}], @NL80211_ATTR_DONT_WAIT_FOR_ACK={0x4}, @NL80211_ATTR_DURATION={0x8, 0x57, 0xe83}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}]}, 0x70}}, 0x4000000) r11 = openat(r3, &(0x7f0000002100)='./file0/file0\x00', 0x2200, 0xab) sendfile(r1, r11, &(0x7f0000002140)=0x2, 0x0) 01:41:27 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x20000000) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000003c0)={'veth0_to_batadv\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$sock_int(r2, 0x1, 0x23, &(0x7f00000001c0), 0x4) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000001, 0x1010, r1, 0x10000000) syz_io_uring_submit(0x0, r3, &(0x7f0000000680)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, r2, 0x0, &(0x7f0000000640)={&(0x7f00000000c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/79, 0x4f}, {&(0x7f0000000200)=""/52, 0x34}, {&(0x7f0000000240)}, {&(0x7f0000000280)=""/41, 0x29}, {&(0x7f00000002c0)=""/104, 0x68}, {&(0x7f0000000340)=""/104, 0x68}, {&(0x7f00000003c0)}, {&(0x7f0000000400)=""/58, 0x3a}, {&(0x7f0000000440)=""/121, 0x79}], 0x9, &(0x7f0000000580)=""/143, 0x8f}, 0x0, 0x10000, 0x1, {0x1}}, 0x10000) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r2) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000240)={@dev={0xac, 0x14, 0x14, 0x44}, @local, r4}, 0xc) ioctl$EXT4_IOC_GET_ES_CACHE(r1, 0xc020662a, &(0x7f00000006c0)={0x0, 0xb6b4, 0x8, 0x0, 0x2, [{0x1f8, 0x9, 0xfff, '\x00', 0x1102}, {0xfff, 0xfffffffffffffffa, 0x9, '\x00', 0x100}]}) [ 116.449660] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:41:28 executing program 2: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x12, 0x13, [{0x0, 0x1}, {0x12, 0x1}, {}, {0x60}, {0x18, 0x1}, {0x77}, {0x36}, {0x6, 0x1}, {0x1, 0x1}, {0x30, 0x1}, {0x9}, {0x1b, 0x1}, {0x36}, {0x9}]}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x36}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x648000, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340), r1) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r4, 0x4, 0x70bd27, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}}, 0x4000000) r5 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NL80211_CMD_GET_SURVEY(r5, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r2, 0x303, 0x70bd25, 0x25dfdbff, {{}, {@void, @void}}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4001}, 0x2400a081) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000680)={'gre0\x00', &(0x7f00000005c0)={'tunl0\x00', 0x0, 0x10, 0x40, 0x5, 0x3f, {{0x26, 0x4, 0x0, 0x9, 0x98, 0x66, 0x0, 0x1f, 0x2f, 0x0, @multicast2, @remote, {[@timestamp={0x44, 0xc, 0xa9, 0x0, 0x8, [0x0, 0x6]}, @generic={0x82, 0xb, "3854b1fd2466626f14"}, @noop, @ssrr={0x89, 0xb, 0x4d, [@multicast1, @multicast2]}, @cipso={0x86, 0xd, 0xffffffffffffffff, [{0x2, 0x5, "0c16fa"}, {0x2, 0x2}]}, @generic={0x89, 0x9, "cac9a8c959016e"}, @ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x13, 0xfb, [@private=0xa010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x3f}]}, @lsrr={0x83, 0x13, 0xa6, [@multicast1, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x1f, 0x5e, [@remote, @empty, @private=0xa010102, @multicast1, @multicast2, @loopback, @loopback]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000800)={&(0x7f00000006c0)={0x104, r6, 0x408, 0x70bd2d, 0x25dfdbfc, {}, [@HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x40085}, 0x8800) r8 = syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) preadv(r8, &(0x7f0000001ec0)=[{&(0x7f0000000ac0)=""/30, 0x1e}, {&(0x7f0000000b00)=""/235, 0xeb}, {&(0x7f0000000c00)=""/166, 0xa6}, {&(0x7f0000000cc0)}, {&(0x7f0000000d00)=""/42, 0x2a}, {&(0x7f0000000d40)=""/223, 0xdf}, {&(0x7f0000000e40)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/89, 0x59}], 0x8, 0x1, 0xfff) r9 = creat(&(0x7f0000001f40)='./file0\x00', 0x108) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r9, 0xc018937d, &(0x7f0000001f80)={{0x1, 0x1, 0x18, r8, {0x1}}, './file0\x00'}) sendmsg$NL80211_CMD_FRAME(r10, &(0x7f00000020c0)={&(0x7f0000001fc0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000002080)={&(0x7f0000002000)={0x70, r2, 0x4, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_FRAME={0x1f, 0x33, @action_no_ack={@wo_ht={{0x0, 0x0, 0xe, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, {0x1f}, @broadcast, @broadcast, @from_mac=@broadcast, {0x5, 0x6}}, @smps}}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x16c1}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x9}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x29}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0xa21}], @NL80211_ATTR_DONT_WAIT_FOR_ACK={0x4}, @NL80211_ATTR_DURATION={0x8, 0x57, 0xe83}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}]}, 0x70}}, 0x4000000) r11 = openat(r3, &(0x7f0000002100)='./file0/file0\x00', 0x2200, 0xab) sendfile(r1, r11, &(0x7f0000002140)=0x2, 0x0) [ 116.601081] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:41:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x20000000) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000003c0)={'veth0_to_batadv\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$sock_int(r2, 0x1, 0x23, &(0x7f00000001c0), 0x4) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000001, 0x1010, r1, 0x10000000) syz_io_uring_submit(0x0, r3, &(0x7f0000000680)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, r2, 0x0, &(0x7f0000000640)={&(0x7f00000000c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/79, 0x4f}, {&(0x7f0000000200)=""/52, 0x34}, {&(0x7f0000000240)}, {&(0x7f0000000280)=""/41, 0x29}, {&(0x7f00000002c0)=""/104, 0x68}, {&(0x7f0000000340)=""/104, 0x68}, {&(0x7f00000003c0)}, {&(0x7f0000000400)=""/58, 0x3a}, {&(0x7f0000000440)=""/121, 0x79}], 0x9, &(0x7f0000000580)=""/143, 0x8f}, 0x0, 0x10000, 0x1, {0x1}}, 0x10000) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r2) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000240)={@dev={0xac, 0x14, 0x14, 0x44}, @local, r4}, 0xc) ioctl$EXT4_IOC_GET_ES_CACHE(r1, 0xc020662a, &(0x7f00000006c0)={0x0, 0xb6b4, 0x8, 0x0, 0x2, [{0x1f8, 0x9, 0xfff, '\x00', 0x1102}, {0xfff, 0xfffffffffffffffa, 0x9, '\x00', 0x100}]}) 01:41:42 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x100, 0x7ff, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x7, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x4, 0x3f, 0x40, 0x0, 0x0, 0x4, 0x60080, 0xa, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x882, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x2001, 0x4, 0x5, 0x7, 0x6, 0x2, 0x2, 0x0, 0x3, 0x0, 0x6}, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xb) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000480)) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x6432, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000180), 0xa}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = openat2(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0xb) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r5) listen(0xffffffffffffffff, 0x7) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000fee000/0x1000)=nil, 0x1000, 0x1000, 0x7, &(0x7f0000fee000/0x1000)=nil) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0xc1, 0x90, 0x6, 0xca, 0x0, 0x0, 0x201, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x539, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x10148, 0x20000000000001, 0x20829c, 0x2, 0x40, 0x0, 0xfffe, 0x0, 0x5, 0x0, 0x28e6}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) 01:41:42 executing program 7: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f00000045c0)=[{{&(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="24000000000000000000000007000000441414bb000000007f0000010000000000000000"], 0x28}}], 0x1, 0x0) 01:41:42 executing program 1: syslog(0x3, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000000", @ANYRES32=r0, @ANYBLOB="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"]) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="ff05002179043f5918d8d6000000000000ffff"], 0x1c}}, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r4, 0xfffffffffffffffe, 0x3) sendmsg$NL80211_CMD_SET_WDS_PEER(r4, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000300)={0x58, r3, 0x800, 0x70bd29, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x6, 0x12}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @from_mac}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @random="e67c2abac8d7"}]}, 0x58}, 0x1, 0x0, 0x0, 0x4040000}, 0x400880d) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)={0x24, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @void}}}, 0x24}}, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @void}}}, 0x24}}, 0x0) kcmp(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, r2) 01:41:42 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x20000000) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000003c0)={'veth0_to_batadv\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$sock_int(r2, 0x1, 0x23, &(0x7f00000001c0), 0x4) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000001, 0x1010, r1, 0x10000000) syz_io_uring_submit(0x0, r3, &(0x7f0000000680)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, r2, 0x0, &(0x7f0000000640)={&(0x7f00000000c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/79, 0x4f}, {&(0x7f0000000200)=""/52, 0x34}, {&(0x7f0000000240)}, {&(0x7f0000000280)=""/41, 0x29}, {&(0x7f00000002c0)=""/104, 0x68}, {&(0x7f0000000340)=""/104, 0x68}, {&(0x7f00000003c0)}, {&(0x7f0000000400)=""/58, 0x3a}, {&(0x7f0000000440)=""/121, 0x79}], 0x9, &(0x7f0000000580)=""/143, 0x8f}, 0x0, 0x10000, 0x1, {0x1}}, 0x10000) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r2) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000240)={@dev={0xac, 0x14, 0x14, 0x44}, @local, r4}, 0xc) ioctl$EXT4_IOC_GET_ES_CACHE(r1, 0xc020662a, &(0x7f00000006c0)={0x0, 0xb6b4, 0x8, 0x0, 0x2, [{0x1f8, 0x9, 0xfff, '\x00', 0x1102}, {0xfff, 0xfffffffffffffffa, 0x9, '\x00', 0x100}]}) 01:41:42 executing program 3: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000180)={0xffffffffffffffff, 0xfffffffffffffff8, 0xfffffffffffffffc, 0xfffffffffffffff7}) writev(0xffffffffffffffff, &(0x7f0000001880)=[{&(0x7f0000000480)="9b3e", 0x2}], 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="40001ce2f4400000bbbfba892f66d28af9749dca696c"]) fallocate(r1, 0x0, 0x0, 0x87ffffc) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x5e948dc66b3ce8a1, 0x0, 0xfffffffe}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0x10) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r4, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000380)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, 0x80000, 0x1, {0x0, r5}}, 0x7f) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$sock_int(r6, 0x1, 0x28, &(0x7f00000001c0), 0x4) syz_io_uring_submit(0x0, r3, &(0x7f0000000540)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r6, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000300)=[{&(0x7f00000001c0)=""/54, 0x36}, {&(0x7f00000004c0)=""/118, 0x76}, {&(0x7f0000000580)=""/133, 0x85}], 0x3}, 0x0, 0x40000000, 0x0, {0x3, r5}}, 0x5) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 01:41:42 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc4, 0xd3, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x0, 0x400000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x1, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0xfffffffffffffde5, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) 01:41:42 executing program 2: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x12, 0x13, [{0x0, 0x1}, {0x12, 0x1}, {}, {0x60}, {0x18, 0x1}, {0x77}, {0x36}, {0x6, 0x1}, {0x1, 0x1}, {0x30, 0x1}, {0x9}, {0x1b, 0x1}, {0x36}, {0x9}]}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x36}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x648000, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340), r1) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r4, 0x4, 0x70bd27, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}}, 0x4000000) r5 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NL80211_CMD_GET_SURVEY(r5, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r2, 0x303, 0x70bd25, 0x25dfdbff, {{}, {@void, @void}}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4001}, 0x2400a081) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000680)={'gre0\x00', &(0x7f00000005c0)={'tunl0\x00', 0x0, 0x10, 0x40, 0x5, 0x3f, {{0x26, 0x4, 0x0, 0x9, 0x98, 0x66, 0x0, 0x1f, 0x2f, 0x0, @multicast2, @remote, {[@timestamp={0x44, 0xc, 0xa9, 0x0, 0x8, [0x0, 0x6]}, @generic={0x82, 0xb, "3854b1fd2466626f14"}, @noop, @ssrr={0x89, 0xb, 0x4d, [@multicast1, @multicast2]}, @cipso={0x86, 0xd, 0xffffffffffffffff, [{0x2, 0x5, "0c16fa"}, {0x2, 0x2}]}, @generic={0x89, 0x9, "cac9a8c959016e"}, @ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x13, 0xfb, [@private=0xa010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x3f}]}, @lsrr={0x83, 0x13, 0xa6, [@multicast1, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x1f, 0x5e, [@remote, @empty, @private=0xa010102, @multicast1, @multicast2, @loopback, @loopback]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000800)={&(0x7f00000006c0)={0x104, r6, 0x408, 0x70bd2d, 0x25dfdbfc, {}, [@HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x40085}, 0x8800) r8 = syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) preadv(r8, &(0x7f0000001ec0)=[{&(0x7f0000000ac0)=""/30, 0x1e}, {&(0x7f0000000b00)=""/235, 0xeb}, {&(0x7f0000000c00)=""/166, 0xa6}, {&(0x7f0000000cc0)}, {&(0x7f0000000d00)=""/42, 0x2a}, {&(0x7f0000000d40)=""/223, 0xdf}, {&(0x7f0000000e40)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/89, 0x59}], 0x8, 0x1, 0xfff) r9 = creat(&(0x7f0000001f40)='./file0\x00', 0x108) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r9, 0xc018937d, &(0x7f0000001f80)={{0x1, 0x1, 0x18, r8, {0x1}}, './file0\x00'}) sendmsg$NL80211_CMD_FRAME(r10, &(0x7f00000020c0)={&(0x7f0000001fc0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000002080)={&(0x7f0000002000)={0x70, r2, 0x4, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_FRAME={0x1f, 0x33, @action_no_ack={@wo_ht={{0x0, 0x0, 0xe, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, {0x1f}, @broadcast, @broadcast, @from_mac=@broadcast, {0x5, 0x6}}, @smps}}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x16c1}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x9}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x29}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0xa21}], @NL80211_ATTR_DONT_WAIT_FOR_ACK={0x4}, @NL80211_ATTR_DURATION={0x8, 0x57, 0xe83}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}]}, 0x70}}, 0x4000000) r11 = openat(r3, &(0x7f0000002100)='./file0/file0\x00', 0x2200, 0xab) sendfile(r1, r11, &(0x7f0000002140)=0x2, 0x0) [ 130.536480] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value [ 130.604293] random: crng reseeded on system resumption 01:41:42 executing program 2: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x12, 0x13, [{0x0, 0x1}, {0x12, 0x1}, {}, {0x60}, {0x18, 0x1}, {0x77}, {0x36}, {0x6, 0x1}, {0x1, 0x1}, {0x30, 0x1}, {0x9}, {0x1b, 0x1}, {0x36}, {0x9}]}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x36}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x648000, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340), r1) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r4, 0x4, 0x70bd27, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}}, 0x4000000) r5 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NL80211_CMD_GET_SURVEY(r5, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r2, 0x303, 0x70bd25, 0x25dfdbff, {{}, {@void, @void}}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4001}, 0x2400a081) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000680)={'gre0\x00', &(0x7f00000005c0)={'tunl0\x00', 0x0, 0x10, 0x40, 0x5, 0x3f, {{0x26, 0x4, 0x0, 0x9, 0x98, 0x66, 0x0, 0x1f, 0x2f, 0x0, @multicast2, @remote, {[@timestamp={0x44, 0xc, 0xa9, 0x0, 0x8, [0x0, 0x6]}, @generic={0x82, 0xb, "3854b1fd2466626f14"}, @noop, @ssrr={0x89, 0xb, 0x4d, [@multicast1, @multicast2]}, @cipso={0x86, 0xd, 0xffffffffffffffff, [{0x2, 0x5, "0c16fa"}, {0x2, 0x2}]}, @generic={0x89, 0x9, "cac9a8c959016e"}, @ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x13, 0xfb, [@private=0xa010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x3f}]}, @lsrr={0x83, 0x13, 0xa6, [@multicast1, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x1f, 0x5e, [@remote, @empty, @private=0xa010102, @multicast1, @multicast2, @loopback, @loopback]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000800)={&(0x7f00000006c0)={0x104, r6, 0x408, 0x70bd2d, 0x25dfdbfc, {}, [@HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x40085}, 0x8800) r8 = syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) preadv(r8, &(0x7f0000001ec0)=[{&(0x7f0000000ac0)=""/30, 0x1e}, {&(0x7f0000000b00)=""/235, 0xeb}, {&(0x7f0000000c00)=""/166, 0xa6}, {&(0x7f0000000cc0)}, {&(0x7f0000000d00)=""/42, 0x2a}, {&(0x7f0000000d40)=""/223, 0xdf}, {&(0x7f0000000e40)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/89, 0x59}], 0x8, 0x1, 0xfff) r9 = creat(&(0x7f0000001f40)='./file0\x00', 0x108) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r9, 0xc018937d, &(0x7f0000001f80)={{0x1, 0x1, 0x18, r8, {0x1}}, './file0\x00'}) sendmsg$NL80211_CMD_FRAME(r10, &(0x7f00000020c0)={&(0x7f0000001fc0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000002080)={&(0x7f0000002000)={0x70, r2, 0x4, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_FRAME={0x1f, 0x33, @action_no_ack={@wo_ht={{0x0, 0x0, 0xe, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, {0x1f}, @broadcast, @broadcast, @from_mac=@broadcast, {0x5, 0x6}}, @smps}}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x16c1}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x9}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x29}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0xa21}], @NL80211_ATTR_DONT_WAIT_FOR_ACK={0x4}, @NL80211_ATTR_DURATION={0x8, 0x57, 0xe83}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}]}, 0x70}}, 0x4000000) openat(r3, &(0x7f0000002100)='./file0/file0\x00', 0x2200, 0xab) [ 130.632152] random: crng reseeded on system resumption [ 130.712338] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:41:55 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="6d706f6c3d696e7465726c656176653d7374617469632c73697a653d252c00ad936a7b91f908249c04c13229b4864cded7"]) 01:41:55 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x20000000) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000003c0)={'veth0_to_batadv\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$sock_int(r2, 0x1, 0x23, &(0x7f00000001c0), 0x4) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000001, 0x1010, r1, 0x10000000) syz_io_uring_submit(0x0, r3, &(0x7f0000000680)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, r2, 0x0, &(0x7f0000000640)={&(0x7f00000000c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/79, 0x4f}, {&(0x7f0000000200)=""/52, 0x34}, {&(0x7f0000000240)}, {&(0x7f0000000280)=""/41, 0x29}, {&(0x7f00000002c0)=""/104, 0x68}, {&(0x7f0000000340)=""/104, 0x68}, {&(0x7f00000003c0)}, {&(0x7f0000000400)=""/58, 0x3a}, {&(0x7f0000000440)=""/121, 0x79}], 0x9, &(0x7f0000000580)=""/143, 0x8f}, 0x0, 0x10000, 0x1, {0x1}}, 0x10000) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r2) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000240)={@dev={0xac, 0x14, 0x14, 0x44}, @local, r4}, 0xc) ioctl$EXT4_IOC_GET_ES_CACHE(r1, 0xc020662a, &(0x7f00000006c0)={0x0, 0xb6b4, 0x8, 0x0, 0x2, [{0x1f8, 0x9, 0xfff, '\x00', 0x1102}, {0xfff, 0xfffffffffffffffa, 0x9, '\x00', 0x100}]}) 01:41:55 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc4, 0xd3, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x0, 0x400000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x1, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0xfffffffffffffde5, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) 01:41:55 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) readahead(r0, 0x0, 0xd0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$sock_int(r1, 0x1, 0x28, &(0x7f00000001c0), 0x4) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000200)={0x2, 0x1000, "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"}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r2, 0xfffffffffffffffe, 0x3) pidfd_send_signal(r2, 0xd, &(0x7f0000000140)={0x5, 0x65, 0x80}, 0x0) 01:41:55 executing program 2: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x12, 0x13, [{0x0, 0x1}, {0x12, 0x1}, {}, {0x60}, {0x18, 0x1}, {0x77}, {0x36}, {0x6, 0x1}, {0x1, 0x1}, {0x30, 0x1}, {0x9}, {0x1b, 0x1}, {0x36}, {0x9}]}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x36}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x648000, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340), r1) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r4, 0x4, 0x70bd27, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}}, 0x4000000) r5 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NL80211_CMD_GET_SURVEY(r5, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r2, 0x303, 0x70bd25, 0x25dfdbff, {{}, {@void, @void}}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4001}, 0x2400a081) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000680)={'gre0\x00', &(0x7f00000005c0)={'tunl0\x00', 0x0, 0x10, 0x40, 0x5, 0x3f, {{0x26, 0x4, 0x0, 0x9, 0x98, 0x66, 0x0, 0x1f, 0x2f, 0x0, @multicast2, @remote, {[@timestamp={0x44, 0xc, 0xa9, 0x0, 0x8, [0x0, 0x6]}, @generic={0x82, 0xb, "3854b1fd2466626f14"}, @noop, @ssrr={0x89, 0xb, 0x4d, [@multicast1, @multicast2]}, @cipso={0x86, 0xd, 0xffffffffffffffff, [{0x2, 0x5, "0c16fa"}, {0x2, 0x2}]}, @generic={0x89, 0x9, "cac9a8c959016e"}, @ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x13, 0xfb, [@private=0xa010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x3f}]}, @lsrr={0x83, 0x13, 0xa6, [@multicast1, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x1f, 0x5e, [@remote, @empty, @private=0xa010102, @multicast1, @multicast2, @loopback, @loopback]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000800)={&(0x7f00000006c0)={0x104, r6, 0x408, 0x70bd2d, 0x25dfdbfc, {}, [@HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x40085}, 0x8800) r8 = syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) preadv(r8, &(0x7f0000001ec0)=[{&(0x7f0000000ac0)=""/30, 0x1e}, {&(0x7f0000000b00)=""/235, 0xeb}, {&(0x7f0000000c00)=""/166, 0xa6}, {&(0x7f0000000cc0)}, {&(0x7f0000000d00)=""/42, 0x2a}, {&(0x7f0000000d40)=""/223, 0xdf}, {&(0x7f0000000e40)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/89, 0x59}], 0x8, 0x1, 0xfff) r9 = creat(&(0x7f0000001f40)='./file0\x00', 0x108) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r9, 0xc018937d, &(0x7f0000001f80)={{0x1, 0x1, 0x18, r8, {0x1}}, './file0\x00'}) sendmsg$NL80211_CMD_FRAME(r10, &(0x7f00000020c0)={&(0x7f0000001fc0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000002080)={&(0x7f0000002000)={0x70, r2, 0x4, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_FRAME={0x1f, 0x33, @action_no_ack={@wo_ht={{0x0, 0x0, 0xe, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, {0x1f}, @broadcast, @broadcast, @from_mac=@broadcast, {0x5, 0x6}}, @smps}}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x16c1}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x9}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x29}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0xa21}], @NL80211_ATTR_DONT_WAIT_FOR_ACK={0x4}, @NL80211_ATTR_DURATION={0x8, 0x57, 0xe83}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}]}, 0x70}}, 0x4000000) openat(r3, &(0x7f0000002100)='./file0/file0\x00', 0x2200, 0xab) 01:41:55 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x20000000) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000003c0)={'veth0_to_batadv\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$sock_int(r2, 0x1, 0x23, &(0x7f00000001c0), 0x4) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000001, 0x1010, r1, 0x10000000) syz_io_uring_submit(0x0, r3, &(0x7f0000000680)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, r2, 0x0, &(0x7f0000000640)={&(0x7f00000000c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/79, 0x4f}, {&(0x7f0000000200)=""/52, 0x34}, {&(0x7f0000000240)}, {&(0x7f0000000280)=""/41, 0x29}, {&(0x7f00000002c0)=""/104, 0x68}, {&(0x7f0000000340)=""/104, 0x68}, {&(0x7f00000003c0)}, {&(0x7f0000000400)=""/58, 0x3a}, {&(0x7f0000000440)=""/121, 0x79}], 0x9, &(0x7f0000000580)=""/143, 0x8f}, 0x0, 0x10000, 0x1, {0x1}}, 0x10000) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r2) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000240)={@dev={0xac, 0x14, 0x14, 0x44}, @local, r4}, 0xc) ioctl$EXT4_IOC_GET_ES_CACHE(r1, 0xc020662a, &(0x7f00000006c0)={0x0, 0xb6b4, 0x8, 0x0, 0x2, [{0x1f8, 0x9, 0xfff, '\x00', 0x1102}, {0xfff, 0xfffffffffffffffa, 0x9, '\x00', 0x100}]}) 01:41:55 executing program 3: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000180)={0xffffffffffffffff, 0xfffffffffffffff8, 0xfffffffffffffffc, 0xfffffffffffffff7}) writev(0xffffffffffffffff, &(0x7f0000001880)=[{&(0x7f0000000480)="9b3e", 0x2}], 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="40001ce2f4400000bbbfba892f66d28af9749dca696c"]) fallocate(r1, 0x0, 0x0, 0x87ffffc) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x5e948dc66b3ce8a1, 0x0, 0xfffffffe}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000140)=0x0) socket$netlink(0x10, 0x3, 0x10) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r4, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000380)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, 0x80000, 0x1, {0x0, r5}}, 0x7f) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$sock_int(r6, 0x1, 0x28, &(0x7f00000001c0), 0x4) syz_io_uring_submit(0x0, r3, &(0x7f0000000540)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r6, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000300)=[{&(0x7f00000001c0)=""/54, 0x36}, {&(0x7f00000004c0)=""/118, 0x76}, {&(0x7f0000000580)=""/133, 0x85}], 0x3}, 0x0, 0x40000000, 0x0, {0x3, r5}}, 0x5) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) [ 144.061132] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:41:55 executing program 7: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x51, 0x0, 0x0}, 0x58) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = socket$inet6(0xa, 0x801, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000300)={&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000340)=0x40) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)) r3 = clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clone3(&(0x7f0000000580)={0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000480), {0x28}, &(0x7f00000004c0)=""/29, 0x1d, &(0x7f0000000500)=""/24, &(0x7f0000000540)=[r3, r3], 0x2}, 0x58) clone3(&(0x7f0000000580)={0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000480), {0x28}, &(0x7f00000004c0)=""/29, 0x1d, &(0x7f0000000500)=""/24, &(0x7f0000000540)=[0x0, 0x0], 0x2}, 0x58) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0xdb8a) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x100, 0x10000) clone3(&(0x7f00000002c0)={0x100000000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x18}, &(0x7f00000006c0)=""/4096, 0x1000, &(0x7f0000000140)=""/234, 0x0}, 0x58) 01:41:55 executing program 2: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x12, 0x13, [{0x0, 0x1}, {0x12, 0x1}, {}, {0x60}, {0x18, 0x1}, {0x77}, {0x36}, {0x6, 0x1}, {0x1, 0x1}, {0x30, 0x1}, {0x9}, {0x1b, 0x1}, {0x36}, {0x9}]}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x36}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x648000, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340), r1) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r4, 0x4, 0x70bd27, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}}, 0x4000000) r5 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NL80211_CMD_GET_SURVEY(r5, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r2, 0x303, 0x70bd25, 0x25dfdbff, {{}, {@void, @void}}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4001}, 0x2400a081) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000680)={'gre0\x00', &(0x7f00000005c0)={'tunl0\x00', 0x0, 0x10, 0x40, 0x5, 0x3f, {{0x26, 0x4, 0x0, 0x9, 0x98, 0x66, 0x0, 0x1f, 0x2f, 0x0, @multicast2, @remote, {[@timestamp={0x44, 0xc, 0xa9, 0x0, 0x8, [0x0, 0x6]}, @generic={0x82, 0xb, "3854b1fd2466626f14"}, @noop, @ssrr={0x89, 0xb, 0x4d, [@multicast1, @multicast2]}, @cipso={0x86, 0xd, 0xffffffffffffffff, [{0x2, 0x5, "0c16fa"}, {0x2, 0x2}]}, @generic={0x89, 0x9, "cac9a8c959016e"}, @ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x13, 0xfb, [@private=0xa010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x3f}]}, @lsrr={0x83, 0x13, 0xa6, [@multicast1, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x1f, 0x5e, [@remote, @empty, @private=0xa010102, @multicast1, @multicast2, @loopback, @loopback]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000800)={&(0x7f00000006c0)={0x104, r6, 0x408, 0x70bd2d, 0x25dfdbfc, {}, [@HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x40085}, 0x8800) r8 = syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) preadv(r8, &(0x7f0000001ec0)=[{&(0x7f0000000ac0)=""/30, 0x1e}, {&(0x7f0000000b00)=""/235, 0xeb}, {&(0x7f0000000c00)=""/166, 0xa6}, {&(0x7f0000000cc0)}, {&(0x7f0000000d00)=""/42, 0x2a}, {&(0x7f0000000d40)=""/223, 0xdf}, {&(0x7f0000000e40)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/89, 0x59}], 0x8, 0x1, 0xfff) r9 = creat(&(0x7f0000001f40)='./file0\x00', 0x108) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r9, 0xc018937d, &(0x7f0000001f80)={{0x1, 0x1, 0x18, r8, {0x1}}, './file0\x00'}) sendmsg$NL80211_CMD_FRAME(r10, &(0x7f00000020c0)={&(0x7f0000001fc0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000002080)={&(0x7f0000002000)={0x70, r2, 0x4, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_FRAME={0x1f, 0x33, @action_no_ack={@wo_ht={{0x0, 0x0, 0xe, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, {0x1f}, @broadcast, @broadcast, @from_mac=@broadcast, {0x5, 0x6}}, @smps}}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x16c1}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x9}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x29}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0xa21}], @NL80211_ATTR_DONT_WAIT_FOR_ACK={0x4}, @NL80211_ATTR_DURATION={0x8, 0x57, 0xe83}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}]}, 0x70}}, 0x4000000) [ 144.155244] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:42:09 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc4, 0xd3, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x0, 0x400000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x1, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0xfffffffffffffde5, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) 01:42:09 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$sock_proto_private(r0, 0x89e3, &(0x7f0000000100)="9b4da4054f641871632279e93f26d345dd6f08808e206c7691236124de16b3c7d6cd61267560174fd8d7938ad4bc812efb78575d95a7867215d6c729e2827c0426c7f2d41062d4af3556b1633e4c0a2f6eec8e4e9ef71f6d6a1089df860ed98fc4c21a98a74c0cbb3b4985793c796c8262d94442f80d02f355c82fbc99d10a4d53e71fcfe5e05009c4705d4b54a5186a7c8590ce8d3eb5e459ee59cabe3c82be00ebfb6d28b1b1034edb7a38c70d184a4c43290747908eeeecfe32c31d732fdb7fd2c89015b40044b227f84bc94eab5ee2a55d294c8bf814ce30f1f291d6e1bdb9") connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000002c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002dc0)=ANY=[@ANYBLOB="24000000000000002900000032000000fe880000000000000000000000000101", @ANYRES32, @ANYBLOB="0000000024000000000000002900001832000000fe8000000000000000000000000000aa", @ANYRES32=0x0, @ANYBLOB="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"], 0x198}}], 0x1, 0x0) sendmmsg$inet6(r1, &(0x7f0000002880), 0x4000101, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@mcast1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private2={0xfc, 0x2, '\x00', 0x1}, 0x6, 0x0, 0x0, 0x400, 0x1f, 0x4000204}) 01:42:09 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) syz_genetlink_get_family_id$ethtool(&(0x7f0000000b40), r0) 01:42:09 executing program 2: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x12, 0x13, [{0x0, 0x1}, {0x12, 0x1}, {}, {0x60}, {0x18, 0x1}, {0x77}, {0x36}, {0x6, 0x1}, {0x1, 0x1}, {0x30, 0x1}, {0x9}, {0x1b, 0x1}, {0x36}, {0x9}]}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x36}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x648000, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340), r1) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r4, 0x4, 0x70bd27, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}}, 0x4000000) r5 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NL80211_CMD_GET_SURVEY(r5, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r2, 0x303, 0x70bd25, 0x25dfdbff, {{}, {@void, @void}}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4001}, 0x2400a081) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000680)={'gre0\x00', &(0x7f00000005c0)={'tunl0\x00', 0x0, 0x10, 0x40, 0x5, 0x3f, {{0x26, 0x4, 0x0, 0x9, 0x98, 0x66, 0x0, 0x1f, 0x2f, 0x0, @multicast2, @remote, {[@timestamp={0x44, 0xc, 0xa9, 0x0, 0x8, [0x0, 0x6]}, @generic={0x82, 0xb, "3854b1fd2466626f14"}, @noop, @ssrr={0x89, 0xb, 0x4d, [@multicast1, @multicast2]}, @cipso={0x86, 0xd, 0xffffffffffffffff, [{0x2, 0x5, "0c16fa"}, {0x2, 0x2}]}, @generic={0x89, 0x9, "cac9a8c959016e"}, @ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x13, 0xfb, [@private=0xa010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x3f}]}, @lsrr={0x83, 0x13, 0xa6, [@multicast1, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x1f, 0x5e, [@remote, @empty, @private=0xa010102, @multicast1, @multicast2, @loopback, @loopback]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000800)={&(0x7f00000006c0)={0x104, r6, 0x408, 0x70bd2d, 0x25dfdbfc, {}, [@HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x40085}, 0x8800) r8 = syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) preadv(r8, &(0x7f0000001ec0)=[{&(0x7f0000000ac0)=""/30, 0x1e}, {&(0x7f0000000b00)=""/235, 0xeb}, {&(0x7f0000000c00)=""/166, 0xa6}, {&(0x7f0000000cc0)}, {&(0x7f0000000d00)=""/42, 0x2a}, {&(0x7f0000000d40)=""/223, 0xdf}, {&(0x7f0000000e40)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/89, 0x59}], 0x8, 0x1, 0xfff) r9 = creat(&(0x7f0000001f40)='./file0\x00', 0x108) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r9, 0xc018937d, &(0x7f0000001f80)={{0x1, 0x1, 0x18, r8, {0x1}}, './file0\x00'}) 01:42:09 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x20000000) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000003c0)={'veth0_to_batadv\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$sock_int(r2, 0x1, 0x23, &(0x7f00000001c0), 0x4) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000001, 0x1010, r1, 0x10000000) syz_io_uring_submit(0x0, r3, &(0x7f0000000680)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, r2, 0x0, &(0x7f0000000640)={&(0x7f00000000c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/79, 0x4f}, {&(0x7f0000000200)=""/52, 0x34}, {&(0x7f0000000240)}, {&(0x7f0000000280)=""/41, 0x29}, {&(0x7f00000002c0)=""/104, 0x68}, {&(0x7f0000000340)=""/104, 0x68}, {&(0x7f00000003c0)}, {&(0x7f0000000400)=""/58, 0x3a}, {&(0x7f0000000440)=""/121, 0x79}], 0x9, &(0x7f0000000580)=""/143, 0x8f}, 0x0, 0x10000, 0x1, {0x1}}, 0x10000) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r2) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000240)={@dev={0xac, 0x14, 0x14, 0x44}, @local, r4}, 0xc) 01:42:09 executing program 0: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x12, 0x13, [{0x0, 0x1}, {0x12, 0x1}, {}, {0x60}, {0x18, 0x1}, {0x77}, {0x36}, {0x6, 0x1}, {0x1, 0x1}, {0x30, 0x1}, {0x9}, {0x1b, 0x1}, {0x36}, {0x9}]}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x36}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x648000, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340), r1) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r4, 0x4, 0x70bd27, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}}, 0x4000000) r5 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NL80211_CMD_GET_SURVEY(r5, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r2, 0x303, 0x70bd25, 0x25dfdbff, {{}, {@void, @void}}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4001}, 0x2400a081) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000680)={'gre0\x00', &(0x7f00000005c0)={'tunl0\x00', 0x0, 0x10, 0x40, 0x5, 0x3f, {{0x26, 0x4, 0x0, 0x9, 0x98, 0x66, 0x0, 0x1f, 0x2f, 0x0, @multicast2, @remote, {[@timestamp={0x44, 0xc, 0xa9, 0x0, 0x8, [0x0, 0x6]}, @generic={0x82, 0xb, "3854b1fd2466626f14"}, @noop, @ssrr={0x89, 0xb, 0x4d, [@multicast1, @multicast2]}, @cipso={0x86, 0xd, 0xffffffffffffffff, [{0x2, 0x5, "0c16fa"}, {0x2, 0x2}]}, @generic={0x89, 0x9, "cac9a8c959016e"}, @ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x13, 0xfb, [@private=0xa010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x3f}]}, @lsrr={0x83, 0x13, 0xa6, [@multicast1, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x1f, 0x5e, [@remote, @empty, @private=0xa010102, @multicast1, @multicast2, @loopback, @loopback]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000800)={&(0x7f00000006c0)={0x104, r6, 0x408, 0x70bd2d, 0x25dfdbfc, {}, [@HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x40085}, 0x8800) r8 = syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) preadv(r8, &(0x7f0000001ec0)=[{&(0x7f0000000ac0)=""/30, 0x1e}, {&(0x7f0000000b00)=""/235, 0xeb}, {&(0x7f0000000c00)=""/166, 0xa6}, {&(0x7f0000000cc0)}, {&(0x7f0000000d00)=""/42, 0x2a}, {&(0x7f0000000d40)=""/223, 0xdf}, {&(0x7f0000000e40)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/89, 0x59}], 0x8, 0x1, 0xfff) r9 = creat(&(0x7f0000001f40)='./file0\x00', 0x108) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r9, 0xc018937d, &(0x7f0000001f80)={{0x1, 0x1, 0x18, r8, {0x1}}, './file0\x00'}) sendmsg$NL80211_CMD_FRAME(r10, &(0x7f00000020c0)={&(0x7f0000001fc0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000002080)={&(0x7f0000002000)={0x70, r2, 0x4, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_FRAME={0x1f, 0x33, @action_no_ack={@wo_ht={{0x0, 0x0, 0xe, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, {0x1f}, @broadcast, @broadcast, @from_mac=@broadcast, {0x5, 0x6}}, @smps}}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x16c1}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x9}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x29}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0xa21}], @NL80211_ATTR_DONT_WAIT_FOR_ACK={0x4}, @NL80211_ATTR_DURATION={0x8, 0x57, 0xe83}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}]}, 0x70}}, 0x4000000) openat(r3, &(0x7f0000002100)='./file0/file0\x00', 0x2200, 0xab) 01:42:09 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f00000017c0)={{r7, 0x3f, 0x3, 0x0, 0x7fff, 0x3, 0x8, 0x6, 0x9, 0x8, 0x1, 0x6c, 0x3, 0x2, 0x1c}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}], 0x5, "af2f1a9317bc6f"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {r9}, {0x0, r16}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {0x0, r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r14}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}], 0x5, "af2f1a9317bc6f"}) 01:42:09 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x20000000) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000003c0)={'veth0_to_batadv\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$sock_int(r2, 0x1, 0x23, &(0x7f00000001c0), 0x4) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000001, 0x1010, r1, 0x10000000) syz_io_uring_submit(0x0, r3, &(0x7f0000000680)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, r2, 0x0, &(0x7f0000000640)={&(0x7f00000000c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/79, 0x4f}, {&(0x7f0000000200)=""/52, 0x34}, {&(0x7f0000000240)}, {&(0x7f0000000280)=""/41, 0x29}, {&(0x7f00000002c0)=""/104, 0x68}, {&(0x7f0000000340)=""/104, 0x68}, {&(0x7f00000003c0)}, {&(0x7f0000000400)=""/58, 0x3a}, {&(0x7f0000000440)=""/121, 0x79}], 0x9, &(0x7f0000000580)=""/143, 0x8f}, 0x0, 0x10000, 0x1, {0x1}}, 0x10000) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r2) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000240)={@dev={0xac, 0x14, 0x14, 0x44}, @local, r4}, 0xc) [ 157.628675] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value [ 157.644904] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:42:09 executing program 2: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x12, 0x13, [{0x0, 0x1}, {0x12, 0x1}, {}, {0x60}, {0x18, 0x1}, {0x77}, {0x36}, {0x6, 0x1}, {0x1, 0x1}, {0x30, 0x1}, {0x9}, {0x1b, 0x1}, {0x36}, {0x9}]}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x36}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x648000, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340), r1) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r4, 0x4, 0x70bd27, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}}, 0x4000000) r5 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NL80211_CMD_GET_SURVEY(r5, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r2, 0x303, 0x70bd25, 0x25dfdbff, {{}, {@void, @void}}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4001}, 0x2400a081) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000680)={'gre0\x00', &(0x7f00000005c0)={'tunl0\x00', 0x0, 0x10, 0x40, 0x5, 0x3f, {{0x26, 0x4, 0x0, 0x9, 0x98, 0x66, 0x0, 0x1f, 0x2f, 0x0, @multicast2, @remote, {[@timestamp={0x44, 0xc, 0xa9, 0x0, 0x8, [0x0, 0x6]}, @generic={0x82, 0xb, "3854b1fd2466626f14"}, @noop, @ssrr={0x89, 0xb, 0x4d, [@multicast1, @multicast2]}, @cipso={0x86, 0xd, 0xffffffffffffffff, [{0x2, 0x5, "0c16fa"}, {0x2, 0x2}]}, @generic={0x89, 0x9, "cac9a8c959016e"}, @ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x13, 0xfb, [@private=0xa010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x3f}]}, @lsrr={0x83, 0x13, 0xa6, [@multicast1, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x1f, 0x5e, [@remote, @empty, @private=0xa010102, @multicast1, @multicast2, @loopback, @loopback]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000800)={&(0x7f00000006c0)={0x104, r6, 0x408, 0x70bd2d, 0x25dfdbfc, {}, [@HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x40085}, 0x8800) r8 = syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) preadv(r8, &(0x7f0000001ec0)=[{&(0x7f0000000ac0)=""/30, 0x1e}, {&(0x7f0000000b00)=""/235, 0xeb}, {&(0x7f0000000c00)=""/166, 0xa6}, {&(0x7f0000000cc0)}, {&(0x7f0000000d00)=""/42, 0x2a}, {&(0x7f0000000d40)=""/223, 0xdf}, {&(0x7f0000000e40)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/89, 0x59}], 0x8, 0x1, 0xfff) creat(&(0x7f0000001f40)='./file0\x00', 0x108) 01:42:09 executing program 0: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x12, 0x13, [{0x0, 0x1}, {0x12, 0x1}, {}, {0x60}, {0x18, 0x1}, {0x77}, {0x36}, {0x6, 0x1}, {0x1, 0x1}, {0x30, 0x1}, {0x9}, {0x1b, 0x1}, {0x36}, {0x9}]}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x36}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x648000, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340), r1) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r4, 0x4, 0x70bd27, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}}, 0x4000000) r5 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NL80211_CMD_GET_SURVEY(r5, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r2, 0x303, 0x70bd25, 0x25dfdbff, {{}, {@void, @void}}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4001}, 0x2400a081) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000680)={'gre0\x00', &(0x7f00000005c0)={'tunl0\x00', 0x0, 0x10, 0x40, 0x5, 0x3f, {{0x26, 0x4, 0x0, 0x9, 0x98, 0x66, 0x0, 0x1f, 0x2f, 0x0, @multicast2, @remote, {[@timestamp={0x44, 0xc, 0xa9, 0x0, 0x8, [0x0, 0x6]}, @generic={0x82, 0xb, "3854b1fd2466626f14"}, @noop, @ssrr={0x89, 0xb, 0x4d, [@multicast1, @multicast2]}, @cipso={0x86, 0xd, 0xffffffffffffffff, [{0x2, 0x5, "0c16fa"}, {0x2, 0x2}]}, @generic={0x89, 0x9, "cac9a8c959016e"}, @ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x13, 0xfb, [@private=0xa010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x3f}]}, @lsrr={0x83, 0x13, 0xa6, [@multicast1, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x1f, 0x5e, [@remote, @empty, @private=0xa010102, @multicast1, @multicast2, @loopback, @loopback]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000800)={&(0x7f00000006c0)={0x104, r6, 0x408, 0x70bd2d, 0x25dfdbfc, {}, [@HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x40085}, 0x8800) r8 = syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) preadv(r8, &(0x7f0000001ec0)=[{&(0x7f0000000ac0)=""/30, 0x1e}, {&(0x7f0000000b00)=""/235, 0xeb}, {&(0x7f0000000c00)=""/166, 0xa6}, {&(0x7f0000000cc0)}, {&(0x7f0000000d00)=""/42, 0x2a}, {&(0x7f0000000d40)=""/223, 0xdf}, {&(0x7f0000000e40)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/89, 0x59}], 0x8, 0x1, 0xfff) r9 = creat(&(0x7f0000001f40)='./file0\x00', 0x108) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r9, 0xc018937d, &(0x7f0000001f80)={{0x1, 0x1, 0x18, r8, {0x1}}, './file0\x00'}) sendmsg$NL80211_CMD_FRAME(r10, &(0x7f00000020c0)={&(0x7f0000001fc0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000002080)={&(0x7f0000002000)={0x70, r2, 0x4, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_FRAME={0x1f, 0x33, @action_no_ack={@wo_ht={{0x0, 0x0, 0xe, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, {0x1f}, @broadcast, @broadcast, @from_mac=@broadcast, {0x5, 0x6}}, @smps}}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x16c1}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x9}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x29}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0xa21}], @NL80211_ATTR_DONT_WAIT_FOR_ACK={0x4}, @NL80211_ATTR_DURATION={0x8, 0x57, 0xe83}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}]}, 0x70}}, 0x4000000) openat(r3, &(0x7f0000002100)='./file0/file0\x00', 0x2200, 0xab) 01:42:09 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x29, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000280)='devpts\x00', 0x0, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000100)='./file0\x00', 0x500) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) inotify_add_watch(r2, &(0x7f0000000080)='./file1\x00', 0x10000208) openat(r0, &(0x7f0000000040)='./file0\x00', 0x12300, 0x34) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 01:42:09 executing program 7: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) syz_open_dev$hidraw(&(0x7f00000012c0), 0x409, 0x38600) [ 157.801945] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value [ 157.813949] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:42:09 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x20000000) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000003c0)={'veth0_to_batadv\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$sock_int(r2, 0x1, 0x23, &(0x7f00000001c0), 0x4) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000001, 0x1010, r1, 0x10000000) syz_io_uring_submit(0x0, r3, &(0x7f0000000680)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, r2, 0x0, &(0x7f0000000640)={&(0x7f00000000c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/79, 0x4f}, {&(0x7f0000000200)=""/52, 0x34}, {&(0x7f0000000240)}, {&(0x7f0000000280)=""/41, 0x29}, {&(0x7f00000002c0)=""/104, 0x68}, {&(0x7f0000000340)=""/104, 0x68}, {&(0x7f00000003c0)}, {&(0x7f0000000400)=""/58, 0x3a}, {&(0x7f0000000440)=""/121, 0x79}], 0x9, &(0x7f0000000580)=""/143, 0x8f}, 0x0, 0x10000, 0x1, {0x1}}, 0x10000) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000240)={@dev={0xac, 0x14, 0x14, 0x44}, @local, r4}, 0xc) 01:42:09 executing program 2: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x12, 0x13, [{0x0, 0x1}, {0x12, 0x1}, {}, {0x60}, {0x18, 0x1}, {0x77}, {0x36}, {0x6, 0x1}, {0x1, 0x1}, {0x30, 0x1}, {0x9}, {0x1b, 0x1}, {0x36}, {0x9}]}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x36}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x648000, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340), r1) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r4, 0x4, 0x70bd27, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}}, 0x4000000) r5 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NL80211_CMD_GET_SURVEY(r5, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r2, 0x303, 0x70bd25, 0x25dfdbff, {{}, {@void, @void}}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4001}, 0x2400a081) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000680)={'gre0\x00', &(0x7f00000005c0)={'tunl0\x00', 0x0, 0x10, 0x40, 0x5, 0x3f, {{0x26, 0x4, 0x0, 0x9, 0x98, 0x66, 0x0, 0x1f, 0x2f, 0x0, @multicast2, @remote, {[@timestamp={0x44, 0xc, 0xa9, 0x0, 0x8, [0x0, 0x6]}, @generic={0x82, 0xb, "3854b1fd2466626f14"}, @noop, @ssrr={0x89, 0xb, 0x4d, [@multicast1, @multicast2]}, @cipso={0x86, 0xd, 0xffffffffffffffff, [{0x2, 0x5, "0c16fa"}, {0x2, 0x2}]}, @generic={0x89, 0x9, "cac9a8c959016e"}, @ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x13, 0xfb, [@private=0xa010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x3f}]}, @lsrr={0x83, 0x13, 0xa6, [@multicast1, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x1f, 0x5e, [@remote, @empty, @private=0xa010102, @multicast1, @multicast2, @loopback, @loopback]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000800)={&(0x7f00000006c0)={0x104, r6, 0x408, 0x70bd2d, 0x25dfdbfc, {}, [@HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x40085}, 0x8800) r8 = syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) preadv(r8, &(0x7f0000001ec0)=[{&(0x7f0000000ac0)=""/30, 0x1e}, {&(0x7f0000000b00)=""/235, 0xeb}, {&(0x7f0000000c00)=""/166, 0xa6}, {&(0x7f0000000cc0)}, {&(0x7f0000000d00)=""/42, 0x2a}, {&(0x7f0000000d40)=""/223, 0xdf}, {&(0x7f0000000e40)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/89, 0x59}], 0x8, 0x1, 0xfff) 01:42:09 executing program 0: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x12, 0x13, [{0x0, 0x1}, {0x12, 0x1}, {}, {0x60}, {0x18, 0x1}, {0x77}, {0x36}, {0x6, 0x1}, {0x1, 0x1}, {0x30, 0x1}, {0x9}, {0x1b, 0x1}, {0x36}, {0x9}]}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x36}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x648000, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340), r1) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r4, 0x4, 0x70bd27, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}}, 0x4000000) r5 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NL80211_CMD_GET_SURVEY(r5, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r2, 0x303, 0x70bd25, 0x25dfdbff, {{}, {@void, @void}}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4001}, 0x2400a081) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000680)={'gre0\x00', &(0x7f00000005c0)={'tunl0\x00', 0x0, 0x10, 0x40, 0x5, 0x3f, {{0x26, 0x4, 0x0, 0x9, 0x98, 0x66, 0x0, 0x1f, 0x2f, 0x0, @multicast2, @remote, {[@timestamp={0x44, 0xc, 0xa9, 0x0, 0x8, [0x0, 0x6]}, @generic={0x82, 0xb, "3854b1fd2466626f14"}, @noop, @ssrr={0x89, 0xb, 0x4d, [@multicast1, @multicast2]}, @cipso={0x86, 0xd, 0xffffffffffffffff, [{0x2, 0x5, "0c16fa"}, {0x2, 0x2}]}, @generic={0x89, 0x9, "cac9a8c959016e"}, @ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x13, 0xfb, [@private=0xa010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x3f}]}, @lsrr={0x83, 0x13, 0xa6, [@multicast1, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x1f, 0x5e, [@remote, @empty, @private=0xa010102, @multicast1, @multicast2, @loopback, @loopback]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000800)={&(0x7f00000006c0)={0x104, r6, 0x408, 0x70bd2d, 0x25dfdbfc, {}, [@HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x40085}, 0x8800) r8 = syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) preadv(r8, &(0x7f0000001ec0)=[{&(0x7f0000000ac0)=""/30, 0x1e}, {&(0x7f0000000b00)=""/235, 0xeb}, {&(0x7f0000000c00)=""/166, 0xa6}, {&(0x7f0000000cc0)}, {&(0x7f0000000d00)=""/42, 0x2a}, {&(0x7f0000000d40)=""/223, 0xdf}, {&(0x7f0000000e40)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/89, 0x59}], 0x8, 0x1, 0xfff) r9 = creat(&(0x7f0000001f40)='./file0\x00', 0x108) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r9, 0xc018937d, &(0x7f0000001f80)={{0x1, 0x1, 0x18, r8, {0x1}}, './file0\x00'}) sendmsg$NL80211_CMD_FRAME(r10, &(0x7f00000020c0)={&(0x7f0000001fc0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000002080)={&(0x7f0000002000)={0x70, r2, 0x4, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_FRAME={0x1f, 0x33, @action_no_ack={@wo_ht={{0x0, 0x0, 0xe, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, {0x1f}, @broadcast, @broadcast, @from_mac=@broadcast, {0x5, 0x6}}, @smps}}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x16c1}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x9}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x29}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0xa21}], @NL80211_ATTR_DONT_WAIT_FOR_ACK={0x4}, @NL80211_ATTR_DURATION={0x8, 0x57, 0xe83}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}]}, 0x70}}, 0x4000000) openat(r3, &(0x7f0000002100)='./file0/file0\x00', 0x2200, 0xab) 01:42:09 executing program 7: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r0, 0x600, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, 0x30}, 0x1, 0x0, 0x0, 0x20004}, 0x1d4c6623898fb63a) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa04, 0x0, @perf_config_ext={0x0, 0x5}, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) [ 157.939613] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value [ 157.959647] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:42:22 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x20000000) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000003c0)={'veth0_to_batadv\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$sock_int(r2, 0x1, 0x23, &(0x7f00000001c0), 0x4) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000001, 0x1010, r1, 0x10000000) syz_io_uring_submit(0x0, r3, &(0x7f0000000680)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, r2, 0x0, &(0x7f0000000640)={&(0x7f00000000c0)=@xdp, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/79, 0x4f}, {&(0x7f0000000200)=""/52, 0x34}, {&(0x7f0000000240)}, {&(0x7f0000000280)=""/41, 0x29}, {&(0x7f00000002c0)=""/104, 0x68}, {&(0x7f0000000340)=""/104, 0x68}, {&(0x7f00000003c0)}, {&(0x7f0000000400)=""/58, 0x3a}, {&(0x7f0000000440)=""/121, 0x79}], 0x9, &(0x7f0000000580)=""/143, 0x8f}, 0x0, 0x10000, 0x1, {0x1}}, 0x10000) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r2) 01:42:22 executing program 0: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x12, 0x13, [{0x0, 0x1}, {0x12, 0x1}, {}, {0x60}, {0x18, 0x1}, {0x77}, {0x36}, {0x6, 0x1}, {0x1, 0x1}, {0x30, 0x1}, {0x9}, {0x1b, 0x1}, {0x36}, {0x9}]}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x36}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x648000, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340), r1) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r4, 0x4, 0x70bd27, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}}, 0x4000000) r5 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NL80211_CMD_GET_SURVEY(r5, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r2, 0x303, 0x70bd25, 0x25dfdbff, {{}, {@void, @void}}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4001}, 0x2400a081) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000680)={'gre0\x00', &(0x7f00000005c0)={'tunl0\x00', 0x0, 0x10, 0x40, 0x5, 0x3f, {{0x26, 0x4, 0x0, 0x9, 0x98, 0x66, 0x0, 0x1f, 0x2f, 0x0, @multicast2, @remote, {[@timestamp={0x44, 0xc, 0xa9, 0x0, 0x8, [0x0, 0x6]}, @generic={0x82, 0xb, "3854b1fd2466626f14"}, @noop, @ssrr={0x89, 0xb, 0x4d, [@multicast1, @multicast2]}, @cipso={0x86, 0xd, 0xffffffffffffffff, [{0x2, 0x5, "0c16fa"}, {0x2, 0x2}]}, @generic={0x89, 0x9, "cac9a8c959016e"}, @ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x13, 0xfb, [@private=0xa010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x3f}]}, @lsrr={0x83, 0x13, 0xa6, [@multicast1, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x1f, 0x5e, [@remote, @empty, @private=0xa010102, @multicast1, @multicast2, @loopback, @loopback]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000800)={&(0x7f00000006c0)={0x104, r6, 0x408, 0x70bd2d, 0x25dfdbfc, {}, [@HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x40085}, 0x8800) r8 = syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) preadv(r8, &(0x7f0000001ec0)=[{&(0x7f0000000ac0)=""/30, 0x1e}, {&(0x7f0000000b00)=""/235, 0xeb}, {&(0x7f0000000c00)=""/166, 0xa6}, {&(0x7f0000000cc0)}, {&(0x7f0000000d00)=""/42, 0x2a}, {&(0x7f0000000d40)=""/223, 0xdf}, {&(0x7f0000000e40)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/89, 0x59}], 0x8, 0x1, 0xfff) r9 = creat(&(0x7f0000001f40)='./file0\x00', 0x108) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r9, 0xc018937d, &(0x7f0000001f80)={{0x1, 0x1, 0x18, r8, {0x1}}, './file0\x00'}) sendmsg$NL80211_CMD_FRAME(r10, &(0x7f00000020c0)={&(0x7f0000001fc0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000002080)={&(0x7f0000002000)={0x70, r2, 0x4, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_FRAME={0x1f, 0x33, @action_no_ack={@wo_ht={{0x0, 0x0, 0xe, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, {0x1f}, @broadcast, @broadcast, @from_mac=@broadcast, {0x5, 0x6}}, @smps}}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x16c1}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x9}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x29}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0xa21}], @NL80211_ATTR_DONT_WAIT_FOR_ACK={0x4}, @NL80211_ATTR_DURATION={0x8, 0x57, 0xe83}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}]}, 0x70}}, 0x4000000) 01:42:22 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f00000017c0)={{r7, 0x3f, 0x3, 0x0, 0x7fff, 0x3, 0x8, 0x6, 0x9, 0x8, 0x1, 0x6c, 0x3, 0x2, 0x1c}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}], 0x5, "af2f1a9317bc6f"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {r9}, {0x0, r16}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {0x0, r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r14}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}], 0x5, "af2f1a9317bc6f"}) 01:42:22 executing program 2: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x12, 0x13, [{0x0, 0x1}, {0x12, 0x1}, {}, {0x60}, {0x18, 0x1}, {0x77}, {0x36}, {0x6, 0x1}, {0x1, 0x1}, {0x30, 0x1}, {0x9}, {0x1b, 0x1}, {0x36}, {0x9}]}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x36}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x648000, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340), r1) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r4, 0x4, 0x70bd27, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}}, 0x4000000) r5 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NL80211_CMD_GET_SURVEY(r5, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r2, 0x303, 0x70bd25, 0x25dfdbff, {{}, {@void, @void}}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4001}, 0x2400a081) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000680)={'gre0\x00', &(0x7f00000005c0)={'tunl0\x00', 0x0, 0x10, 0x40, 0x5, 0x3f, {{0x26, 0x4, 0x0, 0x9, 0x98, 0x66, 0x0, 0x1f, 0x2f, 0x0, @multicast2, @remote, {[@timestamp={0x44, 0xc, 0xa9, 0x0, 0x8, [0x0, 0x6]}, @generic={0x82, 0xb, "3854b1fd2466626f14"}, @noop, @ssrr={0x89, 0xb, 0x4d, [@multicast1, @multicast2]}, @cipso={0x86, 0xd, 0xffffffffffffffff, [{0x2, 0x5, "0c16fa"}, {0x2, 0x2}]}, @generic={0x89, 0x9, "cac9a8c959016e"}, @ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x13, 0xfb, [@private=0xa010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x3f}]}, @lsrr={0x83, 0x13, 0xa6, [@multicast1, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x1f, 0x5e, [@remote, @empty, @private=0xa010102, @multicast1, @multicast2, @loopback, @loopback]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000800)={&(0x7f00000006c0)={0x104, r6, 0x408, 0x70bd2d, 0x25dfdbfc, {}, [@HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x40085}, 0x8800) syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:42:22 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) r1 = fork() fork() r2 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r2, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x4401, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x408002, 0xc0) lseek(r3, 0xfffffffffffffffe, 0x3) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r4, 0xfffffffffffffffe, 0x3) accept4$bt_l2cap(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000100), 0x5000) 01:42:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x20000000) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000003c0)={'veth0_to_batadv\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$sock_int(r2, 0x1, 0x23, &(0x7f00000001c0), 0x4) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000001, 0x1010, r1, 0x10000000) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000240)={@dev={0xac, 0x14, 0x14, 0x44}, @local}, 0xc) 01:42:22 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc4, 0xd3, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x0, 0x400000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x1, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0xfffffffffffffde5, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) 01:42:22 executing program 7: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r0, 0x600, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, 0x30}, 0x1, 0x0, 0x0, 0x20004}, 0x1d4c6623898fb63a) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa04, 0x0, @perf_config_ext={0x0, 0x5}, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) [ 170.889949] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value [ 170.906087] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:42:22 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x20000000) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000003c0)={'veth0_to_batadv\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$sock_int(r2, 0x1, 0x23, &(0x7f00000001c0), 0x4) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000001, 0x1010, r1, 0x10000000) syz_io_uring_submit(0x0, r3, &(0x7f0000000680)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, r2, 0x0, &(0x7f0000000640)={&(0x7f00000000c0)=@xdp, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/79, 0x4f}, {&(0x7f0000000200)=""/52, 0x34}, {&(0x7f0000000240)}, {&(0x7f0000000280)=""/41, 0x29}, {&(0x7f00000002c0)=""/104, 0x68}, {&(0x7f0000000340)=""/104, 0x68}, {&(0x7f00000003c0)}, {&(0x7f0000000400)=""/58, 0x3a}, {&(0x7f0000000440)=""/121, 0x79}], 0x9, &(0x7f0000000580)=""/143, 0x8f}, 0x0, 0x10000, 0x1, {0x1}}, 0x10000) 01:42:22 executing program 0: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x12, 0x13, [{0x0, 0x1}, {0x12, 0x1}, {}, {0x60}, {0x18, 0x1}, {0x77}, {0x36}, {0x6, 0x1}, {0x1, 0x1}, {0x30, 0x1}, {0x9}, {0x1b, 0x1}, {0x36}, {0x9}]}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x36}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x648000, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340), r1) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r4, 0x4, 0x70bd27, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}}, 0x4000000) r5 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NL80211_CMD_GET_SURVEY(r5, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r2, 0x303, 0x70bd25, 0x25dfdbff, {{}, {@void, @void}}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4001}, 0x2400a081) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000680)={'gre0\x00', &(0x7f00000005c0)={'tunl0\x00', 0x0, 0x10, 0x40, 0x5, 0x3f, {{0x26, 0x4, 0x0, 0x9, 0x98, 0x66, 0x0, 0x1f, 0x2f, 0x0, @multicast2, @remote, {[@timestamp={0x44, 0xc, 0xa9, 0x0, 0x8, [0x0, 0x6]}, @generic={0x82, 0xb, "3854b1fd2466626f14"}, @noop, @ssrr={0x89, 0xb, 0x4d, [@multicast1, @multicast2]}, @cipso={0x86, 0xd, 0xffffffffffffffff, [{0x2, 0x5, "0c16fa"}, {0x2, 0x2}]}, @generic={0x89, 0x9, "cac9a8c959016e"}, @ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x13, 0xfb, [@private=0xa010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x3f}]}, @lsrr={0x83, 0x13, 0xa6, [@multicast1, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x1f, 0x5e, [@remote, @empty, @private=0xa010102, @multicast1, @multicast2, @loopback, @loopback]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000800)={&(0x7f00000006c0)={0x104, r6, 0x408, 0x70bd2d, 0x25dfdbfc, {}, [@HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x40085}, 0x8800) r8 = syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) preadv(r8, &(0x7f0000001ec0)=[{&(0x7f0000000ac0)=""/30, 0x1e}, {&(0x7f0000000b00)=""/235, 0xeb}, {&(0x7f0000000c00)=""/166, 0xa6}, {&(0x7f0000000cc0)}, {&(0x7f0000000d00)=""/42, 0x2a}, {&(0x7f0000000d40)=""/223, 0xdf}, {&(0x7f0000000e40)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/89, 0x59}], 0x8, 0x1, 0xfff) r9 = creat(&(0x7f0000001f40)='./file0\x00', 0x108) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r9, 0xc018937d, &(0x7f0000001f80)={{0x1, 0x1, 0x18, r8, {0x1}}, './file0\x00'}) 01:42:22 executing program 2: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x12, 0x13, [{0x0, 0x1}, {0x12, 0x1}, {}, {0x60}, {0x18, 0x1}, {0x77}, {0x36}, {0x6, 0x1}, {0x1, 0x1}, {0x30, 0x1}, {0x9}, {0x1b, 0x1}, {0x36}, {0x9}]}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x36}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x648000, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340), r1) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r4, 0x4, 0x70bd27, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}}, 0x4000000) r5 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NL80211_CMD_GET_SURVEY(r5, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r2, 0x303, 0x70bd25, 0x25dfdbff, {{}, {@void, @void}}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4001}, 0x2400a081) syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000680)={'gre0\x00', &(0x7f00000005c0)={'tunl0\x00', 0x0, 0x10, 0x40, 0x5, 0x3f, {{0x26, 0x4, 0x0, 0x9, 0x98, 0x66, 0x0, 0x1f, 0x2f, 0x0, @multicast2, @remote, {[@timestamp={0x44, 0xc, 0xa9, 0x0, 0x8, [0x0, 0x6]}, @generic={0x82, 0xb, "3854b1fd2466626f14"}, @noop, @ssrr={0x89, 0xb, 0x4d, [@multicast1, @multicast2]}, @cipso={0x86, 0xd, 0xffffffffffffffff, [{0x2, 0x5, "0c16fa"}, {0x2, 0x2}]}, @generic={0x89, 0x9, "cac9a8c959016e"}, @ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x13, 0xfb, [@private=0xa010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x3f}]}, @lsrr={0x83, 0x13, 0xa6, [@multicast1, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x1f, 0x5e, [@remote, @empty, @private=0xa010102, @multicast1, @multicast2, @loopback, @loopback]}]}}}}}) syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) [ 171.053774] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:42:22 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000500)={0x0, 0x2, 0xffffffffffffffff, 0x6}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}, 0x40, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r1, &(0x7f0000000640)=[{&(0x7f00000002c0)="19", 0x1}], 0x1, 0x8000000, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8918, &(0x7f0000000000)={'lo\x00'}) [ 171.106137] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:42:22 executing program 0: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x12, 0x13, [{0x0, 0x1}, {0x12, 0x1}, {}, {0x60}, {0x18, 0x1}, {0x77}, {0x36}, {0x6, 0x1}, {0x1, 0x1}, {0x30, 0x1}, {0x9}, {0x1b, 0x1}, {0x36}, {0x9}]}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x36}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x648000, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340), r1) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r4, 0x4, 0x70bd27, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}}, 0x4000000) r5 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NL80211_CMD_GET_SURVEY(r5, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r2, 0x303, 0x70bd25, 0x25dfdbff, {{}, {@void, @void}}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4001}, 0x2400a081) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000680)={'gre0\x00', &(0x7f00000005c0)={'tunl0\x00', 0x0, 0x10, 0x40, 0x5, 0x3f, {{0x26, 0x4, 0x0, 0x9, 0x98, 0x66, 0x0, 0x1f, 0x2f, 0x0, @multicast2, @remote, {[@timestamp={0x44, 0xc, 0xa9, 0x0, 0x8, [0x0, 0x6]}, @generic={0x82, 0xb, "3854b1fd2466626f14"}, @noop, @ssrr={0x89, 0xb, 0x4d, [@multicast1, @multicast2]}, @cipso={0x86, 0xd, 0xffffffffffffffff, [{0x2, 0x5, "0c16fa"}, {0x2, 0x2}]}, @generic={0x89, 0x9, "cac9a8c959016e"}, @ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x13, 0xfb, [@private=0xa010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x3f}]}, @lsrr={0x83, 0x13, 0xa6, [@multicast1, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x1f, 0x5e, [@remote, @empty, @private=0xa010102, @multicast1, @multicast2, @loopback, @loopback]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000800)={&(0x7f00000006c0)={0x104, r6, 0x408, 0x70bd2d, 0x25dfdbfc, {}, [@HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x40085}, 0x8800) r8 = syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) preadv(r8, &(0x7f0000001ec0)=[{&(0x7f0000000ac0)=""/30, 0x1e}, {&(0x7f0000000b00)=""/235, 0xeb}, {&(0x7f0000000c00)=""/166, 0xa6}, {&(0x7f0000000cc0)}, {&(0x7f0000000d00)=""/42, 0x2a}, {&(0x7f0000000d40)=""/223, 0xdf}, {&(0x7f0000000e40)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/89, 0x59}], 0x8, 0x1, 0xfff) creat(&(0x7f0000001f40)='./file0\x00', 0x108) 01:42:22 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f00000017c0)={{r7, 0x3f, 0x3, 0x0, 0x7fff, 0x3, 0x8, 0x6, 0x9, 0x8, 0x1, 0x6c, 0x3, 0x2, 0x1c}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}], 0x5, "af2f1a9317bc6f"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {r9}, {0x0, r16}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {0x0, r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r14}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}], 0x5, "af2f1a9317bc6f"}) 01:42:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x20000000) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000003c0)={'veth0_to_batadv\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$sock_int(r2, 0x1, 0x23, &(0x7f00000001c0), 0x4) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000001, 0x1010, r1, 0x10000000) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000240)={@dev={0xac, 0x14, 0x14, 0x44}, @local}, 0xc) [ 171.207462] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:42:22 executing program 2: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x12, 0x13, [{0x0, 0x1}, {0x12, 0x1}, {}, {0x60}, {0x18, 0x1}, {0x77}, {0x36}, {0x6, 0x1}, {0x1, 0x1}, {0x30, 0x1}, {0x9}, {0x1b, 0x1}, {0x36}, {0x9}]}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x36}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x648000, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340), r1) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r4, 0x4, 0x70bd27, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}}, 0x4000000) r5 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NL80211_CMD_GET_SURVEY(r5, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r2, 0x303, 0x70bd25, 0x25dfdbff, {{}, {@void, @void}}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4001}, 0x2400a081) syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:42:22 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x20000000) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000003c0)={'veth0_to_batadv\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$sock_int(r2, 0x1, 0x23, &(0x7f00000001c0), 0x4) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000001, 0x1010, r1, 0x10000000) 01:42:22 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) r1 = fork() fork() r2 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r2, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x4401, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x408002, 0xc0) lseek(r3, 0xfffffffffffffffe, 0x3) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r4, 0xfffffffffffffffe, 0x3) accept4$bt_l2cap(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000100), 0x5000) 01:42:22 executing program 0: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x12, 0x13, [{0x0, 0x1}, {0x12, 0x1}, {}, {0x60}, {0x18, 0x1}, {0x77}, {0x36}, {0x6, 0x1}, {0x1, 0x1}, {0x30, 0x1}, {0x9}, {0x1b, 0x1}, {0x36}, {0x9}]}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x36}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x648000, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340), r1) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r4, 0x4, 0x70bd27, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}}, 0x4000000) r5 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NL80211_CMD_GET_SURVEY(r5, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r2, 0x303, 0x70bd25, 0x25dfdbff, {{}, {@void, @void}}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4001}, 0x2400a081) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000680)={'gre0\x00', &(0x7f00000005c0)={'tunl0\x00', 0x0, 0x10, 0x40, 0x5, 0x3f, {{0x26, 0x4, 0x0, 0x9, 0x98, 0x66, 0x0, 0x1f, 0x2f, 0x0, @multicast2, @remote, {[@timestamp={0x44, 0xc, 0xa9, 0x0, 0x8, [0x0, 0x6]}, @generic={0x82, 0xb, "3854b1fd2466626f14"}, @noop, @ssrr={0x89, 0xb, 0x4d, [@multicast1, @multicast2]}, @cipso={0x86, 0xd, 0xffffffffffffffff, [{0x2, 0x5, "0c16fa"}, {0x2, 0x2}]}, @generic={0x89, 0x9, "cac9a8c959016e"}, @ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x13, 0xfb, [@private=0xa010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x3f}]}, @lsrr={0x83, 0x13, 0xa6, [@multicast1, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x1f, 0x5e, [@remote, @empty, @private=0xa010102, @multicast1, @multicast2, @loopback, @loopback]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000800)={&(0x7f00000006c0)={0x104, r6, 0x408, 0x70bd2d, 0x25dfdbfc, {}, [@HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x40085}, 0x8800) r8 = syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) preadv(r8, &(0x7f0000001ec0)=[{&(0x7f0000000ac0)=""/30, 0x1e}, {&(0x7f0000000b00)=""/235, 0xeb}, {&(0x7f0000000c00)=""/166, 0xa6}, {&(0x7f0000000cc0)}, {&(0x7f0000000d00)=""/42, 0x2a}, {&(0x7f0000000d40)=""/223, 0xdf}, {&(0x7f0000000e40)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/89, 0x59}], 0x8, 0x1, 0xfff) creat(&(0x7f0000001f40)='./file0\x00', 0x108) [ 171.313899] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:42:22 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f00000017c0)={{r7, 0x3f, 0x3, 0x0, 0x7fff, 0x3, 0x8, 0x6, 0x9, 0x8, 0x1, 0x6c, 0x3, 0x2, 0x1c}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}], 0x5, "af2f1a9317bc6f"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {r9}, {0x0, r16}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {0x0, r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r14}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}], 0x5, "af2f1a9317bc6f"}) [ 171.370430] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:42:22 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000500)={0x0, 0x2, 0xffffffffffffffff, 0x6}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}, 0x40, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r1, &(0x7f0000000640)=[{&(0x7f00000002c0)="19", 0x1}], 0x1, 0x8000000, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8918, &(0x7f0000000000)={'lo\x00'}) 01:42:35 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc4, 0xd3, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x0, 0x400000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0xfffffffffffffde5, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) 01:42:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x20000000) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000003c0)={'veth0_to_batadv\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$sock_int(r2, 0x1, 0x23, &(0x7f00000001c0), 0x4) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000240)={@dev={0xac, 0x14, 0x14, 0x44}, @local}, 0xc) 01:42:35 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) r1 = fork() fork() r2 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r2, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x4401, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x408002, 0xc0) lseek(r3, 0xfffffffffffffffe, 0x3) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r4, 0xfffffffffffffffe, 0x3) accept4$bt_l2cap(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000100), 0x5000) 01:42:35 executing program 0: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x12, 0x13, [{0x0, 0x1}, {0x12, 0x1}, {}, {0x60}, {0x18, 0x1}, {0x77}, {0x36}, {0x6, 0x1}, {0x1, 0x1}, {0x30, 0x1}, {0x9}, {0x1b, 0x1}, {0x36}, {0x9}]}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x36}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x648000, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340), r1) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r4, 0x4, 0x70bd27, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}}, 0x4000000) r5 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NL80211_CMD_GET_SURVEY(r5, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r2, 0x303, 0x70bd25, 0x25dfdbff, {{}, {@void, @void}}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4001}, 0x2400a081) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000680)={'gre0\x00', &(0x7f00000005c0)={'tunl0\x00', 0x0, 0x10, 0x40, 0x5, 0x3f, {{0x26, 0x4, 0x0, 0x9, 0x98, 0x66, 0x0, 0x1f, 0x2f, 0x0, @multicast2, @remote, {[@timestamp={0x44, 0xc, 0xa9, 0x0, 0x8, [0x0, 0x6]}, @generic={0x82, 0xb, "3854b1fd2466626f14"}, @noop, @ssrr={0x89, 0xb, 0x4d, [@multicast1, @multicast2]}, @cipso={0x86, 0xd, 0xffffffffffffffff, [{0x2, 0x5, "0c16fa"}, {0x2, 0x2}]}, @generic={0x89, 0x9, "cac9a8c959016e"}, @ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x13, 0xfb, [@private=0xa010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x3f}]}, @lsrr={0x83, 0x13, 0xa6, [@multicast1, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x1f, 0x5e, [@remote, @empty, @private=0xa010102, @multicast1, @multicast2, @loopback, @loopback]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000800)={&(0x7f00000006c0)={0x104, r6, 0x408, 0x70bd2d, 0x25dfdbfc, {}, [@HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x40085}, 0x8800) r8 = syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) preadv(r8, &(0x7f0000001ec0)=[{&(0x7f0000000ac0)=""/30, 0x1e}, {&(0x7f0000000b00)=""/235, 0xeb}, {&(0x7f0000000c00)=""/166, 0xa6}, {&(0x7f0000000cc0)}, {&(0x7f0000000d00)=""/42, 0x2a}, {&(0x7f0000000d40)=""/223, 0xdf}, {&(0x7f0000000e40)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/89, 0x59}], 0x8, 0x1, 0xfff) 01:42:35 executing program 2: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x12, 0x13, [{0x0, 0x1}, {0x12, 0x1}, {}, {0x60}, {0x18, 0x1}, {0x77}, {0x36}, {0x6, 0x1}, {0x1, 0x1}, {0x30, 0x1}, {0x9}, {0x1b, 0x1}, {0x36}, {0x9}]}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x36}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x648000, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340), r1) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r4, 0x4, 0x70bd27, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}}, 0x4000000) r5 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NL80211_CMD_GET_SURVEY(r5, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r2, 0x303, 0x70bd25, 0x25dfdbff, {{}, {@void, @void}}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4001}, 0x2400a081) syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:42:35 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x20000000) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000003c0)={'veth0_to_batadv\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$sock_int(r2, 0x1, 0x23, &(0x7f00000001c0), 0x4) 01:42:35 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f00000017c0)={{r3, 0x3f, 0x3, 0x0, 0x7fff, 0x3, 0x8, 0x6, 0x9, 0x8, 0x1, 0x6c, 0x3, 0x2, 0x1c}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x5, "af2f1a9317bc6f"}) 01:42:35 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000500)={0x0, 0x2, 0xffffffffffffffff, 0x6}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}, 0x40, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r1, &(0x7f0000000640)=[{&(0x7f00000002c0)="19", 0x1}], 0x1, 0x8000000, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8918, &(0x7f0000000000)={'lo\x00'}) [ 183.574477] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value [ 183.579068] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:42:35 executing program 2: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x12, 0x13, [{0x0, 0x1}, {0x12, 0x1}, {}, {0x60}, {0x18, 0x1}, {0x77}, {0x36}, {0x6, 0x1}, {0x1, 0x1}, {0x30, 0x1}, {0x9}, {0x1b, 0x1}, {0x36}, {0x9}]}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x36}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x648000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340), r1) sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r3, 0x4, 0x70bd27, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}}, 0x4000000) socket$netlink(0x10, 0x3, 0x9) syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:42:35 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f00000017c0)={{r3, 0x3f, 0x3, 0x0, 0x7fff, 0x3, 0x8, 0x6, 0x9, 0x8, 0x1, 0x6c, 0x3, 0x2, 0x1c}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x5, "af2f1a9317bc6f"}) 01:42:35 executing program 0: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x12, 0x13, [{0x0, 0x1}, {0x12, 0x1}, {}, {0x60}, {0x18, 0x1}, {0x77}, {0x36}, {0x6, 0x1}, {0x1, 0x1}, {0x30, 0x1}, {0x9}, {0x1b, 0x1}, {0x36}, {0x9}]}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x36}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x648000, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340), r1) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r4, 0x4, 0x70bd27, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}}, 0x4000000) r5 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NL80211_CMD_GET_SURVEY(r5, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r2, 0x303, 0x70bd25, 0x25dfdbff, {{}, {@void, @void}}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4001}, 0x2400a081) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000680)={'gre0\x00', &(0x7f00000005c0)={'tunl0\x00', 0x0, 0x10, 0x40, 0x5, 0x3f, {{0x26, 0x4, 0x0, 0x9, 0x98, 0x66, 0x0, 0x1f, 0x2f, 0x0, @multicast2, @remote, {[@timestamp={0x44, 0xc, 0xa9, 0x0, 0x8, [0x0, 0x6]}, @generic={0x82, 0xb, "3854b1fd2466626f14"}, @noop, @ssrr={0x89, 0xb, 0x4d, [@multicast1, @multicast2]}, @cipso={0x86, 0xd, 0xffffffffffffffff, [{0x2, 0x5, "0c16fa"}, {0x2, 0x2}]}, @generic={0x89, 0x9, "cac9a8c959016e"}, @ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x13, 0xfb, [@private=0xa010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x3f}]}, @lsrr={0x83, 0x13, 0xa6, [@multicast1, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x1f, 0x5e, [@remote, @empty, @private=0xa010102, @multicast1, @multicast2, @loopback, @loopback]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000800)={&(0x7f00000006c0)={0x104, r6, 0x408, 0x70bd2d, 0x25dfdbfc, {}, [@HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x40085}, 0x8800) syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) [ 183.734867] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:42:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x20000000) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000003c0)={'veth0_to_batadv\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$sock_int(r2, 0x1, 0x23, &(0x7f00000001c0), 0x4) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000240)={@dev={0xac, 0x14, 0x14, 0x44}, @local}, 0xc) 01:42:35 executing program 2: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x12, 0x13, [{0x0, 0x1}, {0x12, 0x1}, {}, {0x60}, {0x18, 0x1}, {0x77}, {0x36}, {0x6, 0x1}, {0x1, 0x1}, {0x30, 0x1}, {0x9}, {0x1b, 0x1}, {0x36}, {0x9}]}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x36}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x648000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340), r1) sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r3, 0x4, 0x70bd27, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}}, 0x4000000) syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) [ 183.799041] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:42:35 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000500)={0x0, 0x2, 0xffffffffffffffff, 0x6}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}, 0x40, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r1, &(0x7f0000000640)=[{&(0x7f00000002c0)="19", 0x1}], 0x1, 0x8000000, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8918, &(0x7f0000000000)={'lo\x00'}) 01:42:35 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x20000000) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000003c0)={'veth0_to_batadv\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 183.877050] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:42:35 executing program 0: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x12, 0x13, [{0x0, 0x1}, {0x12, 0x1}, {}, {0x60}, {0x18, 0x1}, {0x77}, {0x36}, {0x6, 0x1}, {0x1, 0x1}, {0x30, 0x1}, {0x9}, {0x1b, 0x1}, {0x36}, {0x9}]}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x36}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x648000, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340), r1) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r4, 0x4, 0x70bd27, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}}, 0x4000000) r5 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NL80211_CMD_GET_SURVEY(r5, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r2, 0x303, 0x70bd25, 0x25dfdbff, {{}, {@void, @void}}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4001}, 0x2400a081) syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000680)={'gre0\x00', &(0x7f00000005c0)={'tunl0\x00', 0x0, 0x10, 0x40, 0x5, 0x3f, {{0x26, 0x4, 0x0, 0x9, 0x98, 0x66, 0x0, 0x1f, 0x2f, 0x0, @multicast2, @remote, {[@timestamp={0x44, 0xc, 0xa9, 0x0, 0x8, [0x0, 0x6]}, @generic={0x82, 0xb, "3854b1fd2466626f14"}, @noop, @ssrr={0x89, 0xb, 0x4d, [@multicast1, @multicast2]}, @cipso={0x86, 0xd, 0xffffffffffffffff, [{0x2, 0x5, "0c16fa"}, {0x2, 0x2}]}, @generic={0x89, 0x9, "cac9a8c959016e"}, @ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x13, 0xfb, [@private=0xa010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x3f}]}, @lsrr={0x83, 0x13, 0xa6, [@multicast1, @broadcast, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x1f, 0x5e, [@remote, @empty, @private=0xa010102, @multicast1, @multicast2, @loopback, @loopback]}]}}}}}) syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) [ 183.938666] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value [ 183.940887] loop4: detected capacity change from 0 to 32765 [ 183.973343] FAT-fs (loop4): invalid media value (0x17) [ 183.973870] FAT-fs (loop4): Can't find a valid FAT filesystem [ 197.534802] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:42:49 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x20000000) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000003c0)={'veth0_to_batadv\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) 01:42:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x20000000) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000003c0)={'veth0_to_batadv\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000240)={@dev={0xac, 0x14, 0x14, 0x44}, @local}, 0xc) 01:42:49 executing program 0: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x12, 0x13, [{0x0, 0x1}, {0x12, 0x1}, {}, {0x60}, {0x18, 0x1}, {0x77}, {0x36}, {0x6, 0x1}, {0x1, 0x1}, {0x30, 0x1}, {0x9}, {0x1b, 0x1}, {0x36}, {0x9}]}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x36}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x648000, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340), r1) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r4, 0x4, 0x70bd27, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}}, 0x4000000) r5 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NL80211_CMD_GET_SURVEY(r5, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r2, 0x303, 0x70bd25, 0x25dfdbff, {{}, {@void, @void}}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4001}, 0x2400a081) syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:42:49 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) r1 = fork() fork() r2 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r2, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x4401, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x408002, 0xc0) lseek(r3, 0xfffffffffffffffe, 0x3) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r4, 0xfffffffffffffffe, 0x3) accept4$bt_l2cap(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000100), 0x5000) 01:42:49 executing program 2: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x12, 0x13, [{0x0, 0x1}, {0x12, 0x1}, {}, {0x60}, {0x18, 0x1}, {0x77}, {0x36}, {0x6, 0x1}, {0x1, 0x1}, {0x30, 0x1}, {0x9}, {0x1b, 0x1}, {0x36}, {0x9}]}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x36}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x648000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) syz_genetlink_get_family_id$tipc(&(0x7f0000000340), r1) syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:42:49 executing program 7: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f00000017c0)={{r3, 0x3f, 0x3, 0x0, 0x7fff, 0x3, 0x8, 0x6, 0x9, 0x8, 0x1, 0x6c, 0x3, 0x2, 0x1c}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x5, "af2f1a9317bc6f"}) 01:42:49 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc4, 0xd3, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x0, 0x400000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0xfffffffffffffde5, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) 01:42:49 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f00000017c0)={{r3, 0x3f, 0x3, 0x0, 0x7fff, 0x3, 0x8, 0x6, 0x9, 0x8, 0x1, 0x6c, 0x3, 0x2, 0x1c}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) [ 197.567634] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:42:49 executing program 0: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x12, 0x13, [{0x0, 0x1}, {0x12, 0x1}, {}, {0x60}, {0x18, 0x1}, {0x77}, {0x36}, {0x6, 0x1}, {0x1, 0x1}, {0x30, 0x1}, {0x9}, {0x1b, 0x1}, {0x36}, {0x9}]}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x36}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x648000, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340), r1) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r4, 0x4, 0x70bd27, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}}, 0x4000000) r5 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NL80211_CMD_GET_SURVEY(r5, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r2, 0x303, 0x70bd25, 0x25dfdbff, {{}, {@void, @void}}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4001}, 0x2400a081) syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) [ 197.660946] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:42:49 executing program 2: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x12, 0x13, [{0x0, 0x1}, {0x12, 0x1}, {}, {0x60}, {0x18, 0x1}, {0x77}, {0x36}, {0x6, 0x1}, {0x1, 0x1}, {0x30, 0x1}, {0x9}, {0x1b, 0x1}, {0x36}, {0x9}]}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x36}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x648000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:42:49 executing program 7: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f00000017c0)={{r3, 0x3f, 0x3, 0x0, 0x7fff, 0x3, 0x8, 0x6, 0x9, 0x8, 0x1, 0x6c, 0x3, 0x2, 0x1c}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x5, "af2f1a9317bc6f"}) 01:42:49 executing program 0: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x12, 0x13, [{0x0, 0x1}, {0x12, 0x1}, {}, {0x60}, {0x18, 0x1}, {0x77}, {0x36}, {0x6, 0x1}, {0x1, 0x1}, {0x30, 0x1}, {0x9}, {0x1b, 0x1}, {0x36}, {0x9}]}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x36}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x648000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340), r1) sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r3, 0x4, 0x70bd27, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}}, 0x4000000) socket$netlink(0x10, 0x3, 0x9) syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) [ 197.770252] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value [ 197.812980] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:42:49 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f00000017c0)={{r3, 0x3f, 0x3, 0x0, 0x7fff, 0x3, 0x8, 0x6, 0x9, 0x8, 0x1, 0x6c, 0x3, 0x2, 0x1c}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) 01:42:49 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x20000000) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000003c0)={'veth0_to_batadv\x00'}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) [ 197.901020] loop4: detected capacity change from 0 to 32765 [ 197.910630] FAT-fs (loop4): invalid media value (0x17) [ 197.911003] FAT-fs (loop4): Can't find a valid FAT filesystem 01:43:04 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) r1 = fork() fork() r2 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r2, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x4401, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x408002, 0xc0) lseek(r3, 0xfffffffffffffffe, 0x3) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r4, 0xfffffffffffffffe, 0x3) accept4$bt_l2cap(0xffffffffffffffff, 0x0, 0x0, 0x0) 01:43:04 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc4, 0xd3, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x0, 0x400000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0xfffffffffffffde5, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) 01:43:04 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x20000000) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000003c0)={'veth0_to_batadv\x00'}) 01:43:04 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x20000000) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000003c0)={'veth0_to_batadv\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000240)={@dev={0xac, 0x14, 0x14, 0x44}, @local}, 0xc) 01:43:04 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f00000017c0)={{r3, 0x3f, 0x3, 0x0, 0x7fff, 0x3, 0x8, 0x6, 0x9, 0x8, 0x1, 0x6c, 0x3, 0x2, 0x1c}}) 01:43:04 executing program 7: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f00000017c0)={{r3, 0x3f, 0x3, 0x0, 0x7fff, 0x3, 0x8, 0x6, 0x9, 0x8, 0x1, 0x6c, 0x3, 0x2, 0x1c}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x5, "af2f1a9317bc6f"}) 01:43:04 executing program 0: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x12, 0x13, [{0x0, 0x1}, {0x12, 0x1}, {}, {0x60}, {0x18, 0x1}, {0x77}, {0x36}, {0x6, 0x1}, {0x1, 0x1}, {0x30, 0x1}, {0x9}, {0x1b, 0x1}, {0x36}, {0x9}]}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x36}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x648000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340), r1) sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r3, 0x4, 0x70bd27, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}}, 0x4000000) syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:43:04 executing program 2: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x12, 0x13, [{0x0, 0x1}, {0x12, 0x1}, {}, {0x60}, {0x18, 0x1}, {0x77}, {0x36}, {0x6, 0x1}, {0x1, 0x1}, {0x30, 0x1}, {0x9}, {0x1b, 0x1}, {0x36}, {0x9}]}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x36}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x648000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) [ 213.309693] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value [ 213.343080] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:43:04 executing program 0: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x12, 0x13, [{0x0, 0x1}, {0x12, 0x1}, {}, {0x60}, {0x18, 0x1}, {0x77}, {0x36}, {0x6, 0x1}, {0x1, 0x1}, {0x30, 0x1}, {0x9}, {0x1b, 0x1}, {0x36}, {0x9}]}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x36}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x648000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) syz_genetlink_get_family_id$tipc(&(0x7f0000000340), r1) syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:43:04 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) 01:43:04 executing program 2: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x12, 0x13, [{0x0, 0x1}, {0x12, 0x1}, {}, {0x60}, {0x18, 0x1}, {0x77}, {0x36}, {0x6, 0x1}, {0x1, 0x1}, {0x30, 0x1}, {0x9}, {0x1b, 0x1}, {0x36}, {0x9}]}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x36}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x648000, 0x0) syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) [ 213.430871] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:43:05 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x20000000) 01:43:05 executing program 7: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f00000017c0)={{r3, 0x3f, 0x3, 0x0, 0x7fff, 0x3, 0x8, 0x6, 0x9, 0x8, 0x1, 0x6c, 0x3, 0x2, 0x1c}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x5, "af2f1a9317bc6f"}) 01:43:05 executing program 0: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x12, 0x13, [{0x0, 0x1}, {0x12, 0x1}, {}, {0x60}, {0x18, 0x1}, {0x77}, {0x36}, {0x6, 0x1}, {0x1, 0x1}, {0x30, 0x1}, {0x9}, {0x1b, 0x1}, {0x36}, {0x9}]}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x36}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x648000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) [ 213.579805] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:43:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x20000000) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000003c0)={'veth0_to_batadv\x00'}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000240)={@dev={0xac, 0x14, 0x14, 0x44}, @local}, 0xc) [ 213.587476] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value [ 213.783988] loop4: detected capacity change from 0 to 32765 [ 213.791560] FAT-fs (loop4): invalid media value (0x17) [ 213.792392] FAT-fs (loop4): Can't find a valid FAT filesystem [ 214.468094] Bluetooth: hci7: HCI_REQ-0x0406 [ 214.468351] Bluetooth: hci4: HCI_REQ-0x0406 [ 214.468835] Bluetooth: hci5: HCI_REQ-0x0406 [ 214.469967] Bluetooth: hci1: HCI_REQ-0x0406 [ 214.470220] Bluetooth: hci6: HCI_REQ-0x0406 [ 214.471686] Bluetooth: hci2: HCI_REQ-0x0406 [ 214.471781] Bluetooth: hci3: HCI_REQ-0x0406 [ 214.472882] Bluetooth: hci0: HCI_REQ-0x0406 [ 216.515255] Bluetooth: hci3: command 0x0406 tx timeout [ 216.515272] Bluetooth: hci0: command 0x0406 tx timeout [ 216.515719] Bluetooth: hci2: command 0x0406 tx timeout [ 216.517189] Bluetooth: hci6: command 0x0406 tx timeout [ 216.517590] Bluetooth: hci1: command 0x0406 tx timeout [ 216.518000] Bluetooth: hci5: command 0x0406 tx timeout [ 216.518434] Bluetooth: hci4: command 0x0406 tx timeout [ 216.518836] Bluetooth: hci7: command 0x0406 tx timeout 01:43:17 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x1, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0xfffffffffffffde5, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) 01:43:17 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x20000000) 01:43:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x20000000) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000003c0)={'veth0_to_batadv\x00'}) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000240)={@dev={0xac, 0x14, 0x14, 0x44}, @local}, 0xc) 01:43:17 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) r1 = fork() fork() r2 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r2, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x4401, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x408002, 0xc0) lseek(r3, 0xfffffffffffffffe, 0x3) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r4, 0xfffffffffffffffe, 0x3) 01:43:17 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) 01:43:17 executing program 0: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x12, 0x13, [{0x0, 0x1}, {0x12, 0x1}, {}, {0x60}, {0x18, 0x1}, {0x77}, {0x36}, {0x6, 0x1}, {0x1, 0x1}, {0x30, 0x1}, {0x9}, {0x1b, 0x1}, {0x36}, {0x9}]}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x36}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x648000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:43:17 executing program 2: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x12, 0x13, [{0x0, 0x1}, {0x12, 0x1}, {}, {0x60}, {0x18, 0x1}, {0x77}, {0x36}, {0x6, 0x1}, {0x1, 0x1}, {0x30, 0x1}, {0x9}, {0x1b, 0x1}, {0x36}, {0x9}]}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x36}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c4) syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:43:17 executing program 7: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f00000017c0)={{r3, 0x3f, 0x3, 0x0, 0x7fff, 0x3, 0x8, 0x6, 0x9, 0x8, 0x1, 0x6c, 0x3, 0x2, 0x1c}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) [ 225.500661] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:43:17 executing program 0: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x12, 0x13, [{0x0, 0x1}, {0x12, 0x1}, {}, {0x60}, {0x18, 0x1}, {0x77}, {0x36}, {0x6, 0x1}, {0x1, 0x1}, {0x30, 0x1}, {0x9}, {0x1b, 0x1}, {0x36}, {0x9}]}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x36}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x648000, 0x0) syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) [ 225.559066] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:43:17 executing program 6: sendmsg$inet(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x20000000) 01:43:17 executing program 2: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) [ 225.627515] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:43:17 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 01:43:17 executing program 0: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x12, 0x13, [{0x0, 0x1}, {0x12, 0x1}, {}, {0x60}, {0x18, 0x1}, {0x77}, {0x36}, {0x6, 0x1}, {0x1, 0x1}, {0x30, 0x1}, {0x9}, {0x1b, 0x1}, {0x36}, {0x9}]}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x36}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c4) syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:43:17 executing program 7: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f00000017c0)={{r3, 0x3f, 0x3, 0x0, 0x7fff, 0x3, 0x8, 0x6, 0x9, 0x8, 0x1, 0x6c, 0x3, 0x2, 0x1c}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) [ 225.692957] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:43:17 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) r1 = fork() fork() r2 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r2, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x4401, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x408002, 0xc0) lseek(r3, 0xfffffffffffffffe, 0x3) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) 01:43:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x20000000) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000240)={@dev={0xac, 0x14, 0x14, 0x44}, @local}, 0xc) [ 225.757548] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:43:30 executing program 6: sendmsg$inet(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x20000000) 01:43:30 executing program 0: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:43:30 executing program 2: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:43:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000240)={@dev={0xac, 0x14, 0x14, 0x44}, @local}, 0xc) 01:43:30 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) 01:43:31 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x1, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0xfffffffffffffde5, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) 01:43:31 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) r1 = fork() fork() r2 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r2, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x4401, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x408002, 0xc0) lseek(r3, 0xfffffffffffffffe, 0x3) 01:43:31 executing program 7: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f00000017c0)={{r3, 0x3f, 0x3, 0x0, 0x7fff, 0x3, 0x8, 0x6, 0x9, 0x8, 0x1, 0x6c, 0x3, 0x2, 0x1c}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) [ 239.478727] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value [ 239.526991] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:43:31 executing program 6: sendmsg$inet(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x20000000) 01:43:31 executing program 0: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048804) syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:43:31 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000240)={@dev={0xac, 0x14, 0x14, 0x44}, @local}, 0xc) [ 239.601595] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:43:31 executing program 2: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:43:31 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) r1 = fork() fork() r2 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r2, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x4401, 0x0) lseek(r3, 0xfffffffffffffffe, 0x3) 01:43:31 executing program 6: socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x20000000) 01:43:31 executing program 0: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) [ 239.734928] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:43:31 executing program 5: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000240)={@dev={0xac, 0x14, 0x14, 0x44}, @local}, 0xc) [ 239.770407] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:43:31 executing program 6: socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x20000000) 01:43:31 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:43:31 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xc) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) 01:43:45 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x1, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0xfffffffffffffde5, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) 01:43:45 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) r1 = fork() fork() r2 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r2, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r3, 0xfffffffffffffffe, 0x3) 01:43:45 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xc) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:43:45 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:43:45 executing program 6: socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x20000000) 01:43:45 executing program 2: syz_mount_image$vfat(0x0, &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:43:45 executing program 5: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000240)={@dev={0xac, 0x14, 0x14, 0x44}, @local}, 0xc) 01:43:45 executing program 7: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f00000017c0)={{r3, 0x3f, 0x3, 0x0, 0x7fff, 0x3, 0x8, 0x6, 0x9, 0x8, 0x1, 0x6c, 0x3, 0x2, 0x1c}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) 01:43:46 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:43:46 executing program 2: syz_mount_image$vfat(0x0, &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:43:46 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$inet(r0, 0x0, 0x20000000) 01:43:46 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) r1 = fork() fork() r2 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r2, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffe, 0x3) 01:43:46 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:43:46 executing program 7: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f00000017c0)={{r3, 0x3f, 0x3, 0x0, 0x7fff, 0x3, 0x8, 0x6, 0x9, 0x8, 0x1, 0x6c, 0x3, 0x2, 0x1c}}) 01:43:46 executing program 5: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000240)={@dev={0xac, 0x14, 0x14, 0x44}, @local}, 0xc) 01:43:46 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:44:02 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000240)={@dev={0xac, 0x14, 0x14, 0x44}, @local}, 0xc) 01:44:02 executing program 2: syz_mount_image$vfat(0x0, &(0x7f00000008c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:44:02 executing program 0: syz_mount_image$vfat(&(0x7f0000000880), 0x0, 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:44:02 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) r1 = fork() fork() r2 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r2, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffe, 0x3) 01:44:02 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$inet(r0, 0x0, 0x20000000) 01:44:02 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:44:02 executing program 7: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) 01:44:02 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0xfffffffffffffde5, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) 01:44:02 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:44:02 executing program 0: syz_mount_image$vfat(&(0x7f0000000880), 0x0, 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:44:02 executing program 2: syz_mount_image$vfat(&(0x7f0000000880), 0x0, 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:44:02 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000240)={@dev={0xac, 0x14, 0x14, 0x44}, @local}, 0xc) 01:44:02 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$inet(r0, 0x0, 0x20000000) 01:44:02 executing program 2: syz_mount_image$vfat(&(0x7f0000000880), 0x0, 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:44:02 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000240)={@dev={0xac, 0x14, 0x14, 0x44}, @local}, 0xc) 01:44:02 executing program 7: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) [ 271.439768] loop4: detected capacity change from 0 to 32765 [ 271.445929] FAT-fs (loop4): invalid media value (0x17) [ 271.446751] FAT-fs (loop4): Can't find a valid FAT filesystem 01:44:16 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:44:16 executing program 0: syz_mount_image$vfat(&(0x7f0000000880), 0x0, 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:44:16 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0xfffffffffffffde5, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) 01:44:16 executing program 2: syz_mount_image$vfat(&(0x7f0000000880), 0x0, 0x8, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:44:16 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) r1 = fork() fork() r2 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r2, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffe, 0x3) 01:44:16 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x0, 0x0}, 0x20000000) 01:44:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000240)={@dev={0xac, 0x14, 0x14, 0x44}, @local}, 0xc) 01:44:16 executing program 7: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) 01:44:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000240)={@dev={0xac, 0x14, 0x14, 0x44}, @local}, 0xc) 01:44:16 executing program 2: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:44:16 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x0, 0x0}, 0x20000000) 01:44:16 executing program 0: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000940)=[{&(0x7f0000000900)="f922cf9ecf5dab7a786f259b7d96d326e576e4be5150a469d988473c85dfe33812e367f5b2e39389b0687a1d26f2e6cba9aa60dad7e6", 0x36, 0x7}], 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) [ 285.083051] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value [ 285.104394] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:44:16 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) r1 = fork() fork() r2 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r2, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r3, 0xfffffffffffffffe, 0x3) 01:44:16 executing program 0: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, 0x0, 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:44:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000240)={@dev={0xac, 0x14, 0x14, 0x44}, @local}, 0xc) [ 285.273481] cgroup: fork rejected by pids controller in /syz3 [ 285.417528] loop4: detected capacity change from 0 to 32765 [ 285.425350] FAT-fs (loop4): invalid media value (0x17) [ 285.425901] FAT-fs (loop4): Can't find a valid FAT filesystem 01:44:29 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:44:29 executing program 2: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, 0x0, 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:44:29 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0xfffffffffffffde5, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) 01:44:29 executing program 0: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, 0x0, 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:44:29 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x0, 0x0}, 0x20000000) 01:44:29 executing program 7: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 01:44:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, 0x0, 0x0) 01:44:29 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) r1 = fork() fork() r2 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r2, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r3, 0xfffffffffffffffe, 0x3) 01:44:29 executing program 0: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, 0x0, 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:44:29 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) 01:44:29 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x0) 01:44:29 executing program 2: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, 0x0, 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:44:29 executing program 0: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:44:29 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) r1 = fork() fork() r2 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r2, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r3, 0xfffffffffffffffe, 0x3) [ 298.412507] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:44:29 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) 01:44:30 executing program 0: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) [ 298.521658] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value [ 298.583427] loop4: detected capacity change from 0 to 32765 [ 298.593268] FAT-fs (loop4): invalid media value (0x17) [ 298.593686] FAT-fs (loop4): Can't find a valid FAT filesystem 01:44:42 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:44:42 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x0) 01:44:42 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) 01:44:42 executing program 0: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, 0x0) 01:44:42 executing program 7: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) 01:44:42 executing program 2: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, 0x0, 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:44:42 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) r1 = fork() fork() r2 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r2, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r3, 0xfffffffffffffffe, 0x3) 01:44:42 executing program 4: perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x1, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0xfffffffffffffde5, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) [ 310.685861] perf: interrupt took too long (6358 > 6330), lowering kernel.perf_event_max_sample_rate to 31000 [ 310.690316] perf: interrupt took too long (12535 > 12523), lowering kernel.perf_event_max_sample_rate to 15000 01:44:42 executing program 0: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, 0x0) 01:44:42 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x0) 01:44:42 executing program 2: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x42, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:44:42 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 310.822500] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:44:42 executing program 0: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, 0x0) 01:44:42 executing program 6: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) 01:44:42 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:44:42 executing program 7: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xc) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) 01:44:42 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) 01:44:42 executing program 6: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) [ 311.139668] perf: interrupt took too long (15703 > 15668), lowering kernel.perf_event_max_sample_rate to 12000 [ 311.148301] perf: interrupt took too long (19647 > 19628), lowering kernel.perf_event_max_sample_rate to 10000 01:44:55 executing program 0: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:44:55 executing program 2: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:44:55 executing program 4: perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x1, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0xfffffffffffffde5, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) 01:44:55 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) r1 = fork() fork() r2 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r2, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r3, 0xfffffffffffffffe, 0x3) 01:44:55 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xc) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) 01:44:55 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:44:55 executing program 6: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) 01:44:55 executing program 7: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xc) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 323.836876] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value [ 323.842194] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:44:55 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xc) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:44:55 executing program 7: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:44:55 executing program 6: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xc) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) 01:44:55 executing program 2: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, 0x0) 01:44:55 executing program 0: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:44:55 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 324.103835] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value [ 324.313803] loop4: detected capacity change from 0 to 32765 [ 324.318436] FAT-fs (loop4): invalid media value (0x17) [ 324.319274] FAT-fs (loop4): Can't find a valid FAT filesystem 01:45:08 executing program 2: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, 0x0) 01:45:08 executing program 4: perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x1, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0xfffffffffffffde5, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) [ 337.166086] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:45:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) r1 = fork() fork() r2 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r2, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r3, 0xfffffffffffffffe, 0x3) 01:45:08 executing program 7: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:45:08 executing program 6: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xc) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) 01:45:08 executing program 0: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:45:08 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:45:08 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:45:08 executing program 0: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) [ 337.278553] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:45:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:45:08 executing program 7: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:45:08 executing program 0: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:45:08 executing program 2: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, 0x0) 01:45:08 executing program 6: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xc) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) 01:45:08 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:45:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) r1 = fork() fork() r2 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r2, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x7}) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r3, 0xfffffffffffffffe, 0x3) 01:45:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 337.413759] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value [ 337.969831] loop4: detected capacity change from 0 to 32765 [ 337.981616] FAT-fs (loop4): invalid media value (0x17) [ 337.982019] FAT-fs (loop4): Can't find a valid FAT filesystem 01:45:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:45:22 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x1, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0xfffffffffffffde5, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) 01:45:22 executing program 0: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:45:22 executing program 7: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:45:22 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:45:22 executing program 2: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:45:22 executing program 6: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xc) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:45:22 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) r1 = fork() fork() r2 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r2, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x7}) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r3, 0xfffffffffffffffe, 0x3) [ 350.819718] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value [ 350.823576] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:45:22 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:45:22 executing program 2: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:45:22 executing program 0: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:45:22 executing program 6: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 350.983791] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value [ 350.985403] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:45:22 executing program 0: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) [ 351.063774] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value [ 351.280500] loop4: detected capacity change from 0 to 32765 [ 351.289106] FAT-fs (loop4): invalid media value (0x17) [ 351.290064] FAT-fs (loop4): Can't find a valid FAT filesystem 01:45:35 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) r1 = fork() fork() r2 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r2, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x7}) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r3, 0xfffffffffffffffe, 0x3) 01:45:35 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:45:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:45:35 executing program 2: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:45:35 executing program 6: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:45:35 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x1, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0xfffffffffffffde5, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) 01:45:35 executing program 7: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:45:35 executing program 0: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) [ 364.036719] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value [ 364.074085] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:45:35 executing program 2: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) [ 364.113421] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:45:35 executing program 0: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:45:35 executing program 2: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:45:35 executing program 6: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 364.200779] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value [ 364.224933] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:45:35 executing program 2: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) [ 364.270225] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:45:35 executing program 0: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@utf8}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) [ 364.280294] loop4: detected capacity change from 0 to 32765 [ 364.290225] FAT-fs (loop4): invalid media value (0x17) [ 364.290628] FAT-fs (loop4): Can't find a valid FAT filesystem [ 364.330455] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:45:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:45:50 executing program 7: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:45:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:45:50 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) fork() fork() r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r0, 0x36d6c000) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) 01:45:50 executing program 6: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:45:50 executing program 0: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:45:50 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x1, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0xfffffffffffffde5, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) 01:45:50 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 378.892227] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value [ 378.901959] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:45:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:45:50 executing program 0: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}]}) [ 379.037845] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value [ 379.046658] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:45:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:45:50 executing program 0: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}]}) 01:45:50 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) fork() fork() r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r0, 0x36d6c000) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) [ 379.170219] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value [ 379.196455] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:45:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:45:50 executing program 0: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}]}) [ 379.325462] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value [ 379.354042] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:45:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@utf8}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) [ 379.452039] loop4: detected capacity change from 0 to 32765 [ 379.462344] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value [ 379.466657] FAT-fs (loop4): invalid media value (0x17) [ 379.467646] FAT-fs (loop4): Can't find a valid FAT filesystem 01:46:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:46:05 executing program 7: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:46:05 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x1, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0xfffffffffffffde5, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) 01:46:05 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) fork() fork() r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r0, 0x36d6c000) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) 01:46:05 executing program 2: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:46:05 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:46:05 executing program 6: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:46:05 executing program 0: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}]}) 01:46:05 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 393.892336] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value [ 393.931131] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:46:05 executing program 7: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:46:05 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:46:05 executing program 2: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}]}) 01:46:05 executing program 0: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}]}) 01:46:05 executing program 7: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 394.121911] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value [ 394.134887] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:46:05 executing program 7: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:46:05 executing program 2: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}]}) [ 394.238792] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value [ 394.481976] loop4: detected capacity change from 0 to 32765 [ 394.494036] FAT-fs (loop4): invalid media value (0x17) [ 394.494975] FAT-fs (loop4): Can't find a valid FAT filesystem 01:46:20 executing program 6: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:46:20 executing program 7: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:46:20 executing program 0: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}]}) 01:46:20 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:46:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:46:20 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) r1 = fork() fork() openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r2, 0xfffffffffffffffe, 0x3) 01:46:20 executing program 2: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}]}) 01:46:20 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x1, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0xfffffffffffffde5, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) [ 408.587023] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value [ 408.623462] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:46:20 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:46:20 executing program 0: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}]}) 01:46:20 executing program 2: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}]}) 01:46:20 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 408.773467] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value [ 408.824046] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:46:20 executing program 0: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}]}) 01:46:20 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:46:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:46:20 executing program 2: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}]}) [ 408.941448] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value [ 409.023675] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value [ 409.242865] loop4: detected capacity change from 0 to 32765 [ 409.250754] FAT-fs (loop4): invalid media value (0x17) [ 409.252036] FAT-fs (loop4): Can't find a valid FAT filesystem [ 416.195718] kworker/dying (39) used greatest stack depth: 24744 bytes left 01:46:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:46:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:46:35 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) r1 = fork() fork() openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r2, 0xfffffffffffffffe, 0x3) 01:46:35 executing program 0: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}]}) 01:46:35 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:46:35 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x1, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0xfffffffffffffde5, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) 01:46:35 executing program 2: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}]}) 01:46:35 executing program 6: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:46:35 executing program 6: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 424.174996] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value [ 424.196658] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:46:35 executing program 2: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}]}) 01:46:35 executing program 6: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:46:35 executing program 0: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@rodir}]}) [ 424.349874] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value [ 424.351302] FAT-fs (loop0): bogus number of reserved sectors [ 424.351857] FAT-fs (loop0): Can't find a valid FAT filesystem 01:46:35 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) r1 = fork() fork() openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r2, 0xfffffffffffffffe, 0x3) 01:46:35 executing program 2: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}]}) 01:46:36 executing program 6: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 424.497285] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value [ 424.592678] loop4: detected capacity change from 0 to 32765 [ 424.599004] FAT-fs (loop4): invalid media value (0x17) [ 424.599547] FAT-fs (loop4): Can't find a valid FAT filesystem 01:46:48 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:46:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:46:48 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0xfffffffffffffde5, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) 01:46:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@rodir}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}]}) 01:46:48 executing program 0: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@utf8}, {@uni_xlate}, {@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@shortname_lower}], [{@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x65, 0x37, 0x31, 0x38, 0x33, 0x5], 0x2d, [0x66, 0x61, 0x34, 0x37], 0x2d, [0x62, 0x65, 0x31, 0x30], 0x2d, [0x62, 0x65, 0x31, 0x63], 0x2d, [0x62, 0x34, 0x65, 0x34, 0x34, 0x66, 0x31, 0x35]}}}, {@measure}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x36, 0x30, 0x39, 0x39, 0x0, 0x65, 0x31], 0x2d, [0x64, 0x36, 0x62, 0x30], 0x2d, [0x55, 0x66, 0x64, 0x33], 0x2d, [0x33, 0x66, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x0, 0x36, 0x36, 0x32, 0x35, 0x34]}}}, {@fowner_eq}, {@hash}, {@obj_type={'obj_type', 0x3d, 'vlan0\x00'}}]}) 01:46:48 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) r1 = fork() fork() mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, 0xffffffffffffffff, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r2, 0xfffffffffffffffe, 0x3) 01:46:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:46:48 executing program 6: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 437.083959] FAT-fs (loop2): Unrecognized mount option "smackfsdef=ethtool" or missing value [ 437.116461] FAT-fs (loop0): Unrecognized mount option "smackfsdef=ethtool" or missing value 01:46:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000880), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)={[{@fat=@errors_remount}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@rodir}]}) 01:46:48 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 437.198753] FAT-fs (loop2): bogus number of reserved sectors [ 437.199334] FAT-fs (loop2): Can't find a valid FAT filesystem 01:46:48 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xc) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) 01:46:48 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) r1 = fork() fork() mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, 0xffffffffffffffff, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r2, 0xfffffffffffffffe, 0x3) 01:46:48 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) 01:46:48 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:46:48 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) 01:46:48 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) [ 437.744503] loop4: detected capacity change from 0 to 32765 [ 437.750650] FAT-fs (loop4): invalid media value (0x17) [ 437.751741] FAT-fs (loop4): Can't find a valid FAT filesystem 01:47:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:47:00 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) 01:47:00 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) r1 = fork() fork() mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, 0xffffffffffffffff, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r2, 0xfffffffffffffffe, 0x3) 01:47:00 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x1, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0xfffffffffffffde5, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) 01:47:00 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:47:00 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0xfffffffffffffde5, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) 01:47:00 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:47:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:47:01 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xc) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) 01:47:01 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xc) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:47:01 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xc) 01:47:01 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) r1 = fork() r2 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r2, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r3, 0xfffffffffffffffe, 0x3) [ 449.730522] loop0: detected capacity change from 0 to 32765 [ 449.736949] FAT-fs (loop0): invalid media value (0x17) [ 449.737768] FAT-fs (loop0): Can't find a valid FAT filesystem 01:47:01 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) 01:47:01 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 449.926055] loop4: detected capacity change from 0 to 32765 [ 449.931744] FAT-fs (loop4): invalid media value (0x17) [ 449.932537] FAT-fs (loop4): Can't find a valid FAT filesystem 01:47:01 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) 01:47:01 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f00000017c0)={{r3, 0x3f, 0x3, 0x0, 0x7fff, 0x3, 0x8, 0x6, 0x9, 0x8, 0x1, 0x6c, 0x3, 0x2, 0x1c}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) 01:47:13 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:47:13 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x1, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0xfffffffffffffde5, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) 01:47:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:47:13 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) r1 = fork() r2 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r2, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r3, 0xfffffffffffffffe, 0x3) 01:47:13 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) 01:47:13 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0xfffffffffffffde5, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) 01:47:13 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:47:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:47:13 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) 01:47:14 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) socket$netlink(0x10, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) 01:47:14 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) r1 = fork() r2 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r2, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r3, 0xfffffffffffffffe, 0x3) 01:47:14 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) 01:47:14 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) [ 462.818825] loop4: detected capacity change from 0 to 32765 [ 462.838492] FAT-fs (loop4): invalid media value (0x17) [ 462.839527] FAT-fs (loop4): Can't find a valid FAT filesystem [ 462.901399] loop0: detected capacity change from 0 to 32765 [ 462.918923] FAT-fs (loop0): invalid media value (0x17) [ 462.920102] FAT-fs (loop0): Can't find a valid FAT filesystem 01:47:14 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) 01:47:14 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) fork() r1 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r1, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r2, 0xfffffffffffffffe, 0x3) 01:47:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) 01:47:14 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0xfffffffffffffde5, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) [ 463.475340] loop4: detected capacity change from 0 to 32765 [ 463.480355] FAT-fs (loop4): invalid media value (0x17) [ 463.480995] FAT-fs (loop4): Can't find a valid FAT filesystem 01:47:27 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:47:27 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0xfffffffffffffde5, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) 01:47:27 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$sndseq(r0, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) 01:47:27 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) fork() r1 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r1, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r2, 0xfffffffffffffffe, 0x3) 01:47:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:47:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:47:27 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:47:27 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xc) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) 01:47:27 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$sndseq(r0, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) 01:47:27 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fork() r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r0, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) 01:47:27 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xc) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) [ 476.191904] loop4: detected capacity change from 0 to 32765 [ 476.204515] FAT-fs (loop4): invalid media value (0x17) [ 476.205308] FAT-fs (loop4): Can't find a valid FAT filesystem 01:47:27 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$sndseq(r0, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) 01:47:27 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xc) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) 01:47:27 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fork() r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r0, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) 01:47:27 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0xfffffffffffffde5, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) 01:47:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) write$sndseq(r0, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) [ 476.624039] loop4: detected capacity change from 0 to 32765 [ 476.629337] FAT-fs (loop4): invalid media value (0x17) [ 476.629815] FAT-fs (loop4): Can't find a valid FAT filesystem 01:47:42 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xc) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:47:42 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:47:42 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:47:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) write$sndseq(r0, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) 01:47:42 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fork() r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r0, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) 01:47:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:47:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:47:42 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0xfffffffffffffde5, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) 01:47:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) write$sndseq(r0, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) 01:47:42 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x1, 0x0) fork() r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r0, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) 01:47:42 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xc) 01:47:42 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) 01:47:42 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) 01:47:42 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) 01:47:42 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r0, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) 01:47:42 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) 01:47:42 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) [ 490.977766] loop4: detected capacity change from 0 to 32765 [ 490.987113] FAT-fs (loop4): invalid media value (0x17) [ 490.988490] FAT-fs (loop4): Can't find a valid FAT filesystem 01:47:54 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:47:54 executing program 3: fork() r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r0, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) 01:47:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:47:54 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0xfffffffffffffde5, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) 01:47:54 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) 01:47:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) 01:47:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:47:54 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:47:54 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) socket$netlink(0x10, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) 01:47:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r0, 0x0, 0x0) 01:47:54 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) 01:47:54 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) 01:47:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r0, 0x0, 0x0) 01:47:54 executing program 3: fork() r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r0, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) 01:47:54 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) [ 503.316694] loop4: detected capacity change from 0 to 32765 01:47:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r0, 0x0, 0x0) [ 503.340266] FAT-fs (loop4): invalid media value (0x17) [ 503.340777] FAT-fs (loop4): Can't find a valid FAT filesystem 01:48:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:48:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:48:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) 01:48:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000080), 0x0) 01:48:07 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0xfffffffffffffde5, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) 01:48:07 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:48:07 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:48:07 executing program 3: fork() r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r0, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) 01:48:07 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$sndseq(r0, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) 01:48:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000080), 0x0) 01:48:07 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r0, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) 01:48:07 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$sndseq(r0, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) 01:48:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000080), 0x0) 01:48:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) 01:48:07 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$sndseq(r0, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) 01:48:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) write$sndseq(r0, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) [ 516.428688] loop4: detected capacity change from 0 to 32765 [ 516.434704] FAT-fs (loop4): invalid media value (0x17) [ 516.435628] FAT-fs (loop4): Can't find a valid FAT filesystem 01:48:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:48:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) 01:48:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) write$sndseq(r0, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) 01:48:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:48:22 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:48:22 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x1, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0xfffffffffffffde5, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) 01:48:22 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:48:22 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r0, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) 01:48:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) write$sndseq(r0, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) 01:48:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) 01:48:22 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) 01:48:22 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) 01:48:22 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0xfffffffffffffde5, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) 01:48:22 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) 01:48:22 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r0, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) [ 531.313802] loop2: detected capacity change from 0 to 32765 [ 531.314582] loop4: detected capacity change from 0 to 32765 [ 531.319828] FAT-fs (loop4): invalid media value (0x17) [ 531.320708] FAT-fs (loop4): Can't find a valid FAT filesystem [ 531.321125] FAT-fs (loop2): invalid media value (0x17) [ 531.322002] FAT-fs (loop2): Can't find a valid FAT filesystem 01:48:34 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:48:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r0, 0x0, 0x0) 01:48:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:48:34 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x1, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0xfffffffffffffde5, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) 01:48:34 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r0, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) 01:48:34 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) 01:48:34 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:48:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:48:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r0, 0x0, 0x0) 01:48:35 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r0, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) 01:48:35 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x1, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0xfffffffffffffde5, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) 01:48:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r0, 0x0, 0x0) 01:48:35 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r0, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) 01:48:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000080), 0x0) 01:48:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000080), 0x0) 01:48:35 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r0, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) [ 543.979845] loop2: detected capacity change from 0 to 32765 [ 543.985317] FAT-fs (loop2): invalid media value (0x17) [ 543.985805] FAT-fs (loop2): Can't find a valid FAT filesystem [ 544.031984] loop4: detected capacity change from 0 to 32765 [ 544.038748] FAT-fs (loop4): invalid media value (0x17) [ 544.039542] FAT-fs (loop4): Can't find a valid FAT filesystem 01:48:49 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:48:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000080), 0x0) 01:48:49 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:48:49 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x1, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0xfffffffffffffde5, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) 01:48:49 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r0, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) 01:48:49 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 01:48:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:48:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:48:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) 01:48:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000080), 0x0) 01:48:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) 01:48:49 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r0, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) 01:48:49 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f00000017c0)={{r3, 0x3f, 0x3, 0x0, 0x7fff, 0x3, 0x8, 0x6, 0x9, 0x8, 0x1, 0x6c, 0x3, 0x2, 0x1c}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) 01:48:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) 01:48:49 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f00000017c0)={{r3, 0x3f, 0x3, 0x0, 0x7fff, 0x3, 0x8, 0x6, 0x9, 0x8, 0x1, 0x6c, 0x3, 0x2, 0x1c}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) 01:48:50 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f00000017c0)={{r3, 0x3f, 0x3, 0x0, 0x7fff, 0x3, 0x8, 0x6, 0x9, 0x8, 0x1, 0x6c, 0x3, 0x2, 0x1c}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) [ 558.739630] loop4: detected capacity change from 0 to 32765 [ 558.745432] FAT-fs (loop4): invalid media value (0x17) [ 558.746453] FAT-fs (loop4): Can't find a valid FAT filesystem 01:49:08 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f00000017c0)={{r3, 0x3f, 0x3, 0x0, 0x7fff, 0x3, 0x8, 0x6, 0x9, 0x8, 0x1, 0x6c, 0x3, 0x2, 0x1c}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) 01:49:08 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f00000017c0)={{r3, 0x3f, 0x3, 0x0, 0x7fff, 0x3, 0x8, 0x6, 0x9, 0x8, 0x1, 0x6c, 0x3, 0x2, 0x1c}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) 01:49:08 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x1, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000140)='./file0\x00', 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0x4c, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) 01:49:08 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:49:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:49:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:49:08 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:49:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fork() r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r0, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) [ 576.654347] loop4: detected capacity change from 0 to 264192 01:49:08 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f00000017c0)={{r3, 0x3f, 0x3, 0x0, 0x7fff, 0x3, 0x8, 0x6, 0x9, 0x8, 0x1, 0x6c, 0x3, 0x2, 0x1c}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x5, "af2f1a9317bc6f"}) 01:49:08 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x1, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000140)='./file0\x00', 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0x4c, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) 01:49:08 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f00000017c0)={{r3, 0x3f, 0x3, 0x0, 0x7fff, 0x3, 0x8, 0x6, 0x9, 0x8, 0x1, 0x6c, 0x3, 0x2, 0x1c}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) [ 576.845949] loop4: detected capacity change from 0 to 264192 01:49:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fork() r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r0, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) 01:49:08 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x1, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000140)='./file0\x00', 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0x4c, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) 01:49:08 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f00000017c0)={{r3, 0x3f, 0x3, 0x0, 0x7fff, 0x3, 0x8, 0x6, 0x9, 0x8, 0x1, 0x6c, 0x3, 0x2, 0x1c}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x5, "af2f1a9317bc6f"}) 01:49:08 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f00000017c0)={{r3, 0x3f, 0x3, 0x0, 0x7fff, 0x3, 0x8, 0x6, 0x9, 0x8, 0x1, 0x6c, 0x3, 0x2, 0x1c}}) 01:49:08 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x1, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), 0x0, 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0x4c, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) [ 577.112609] loop4: detected capacity change from 0 to 264192 [ 589.748642] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8740 comm=syz-executor.1 01:49:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:49:21 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:49:21 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) r1 = fork() fork() r2 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r2, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x4401, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x408002, 0xc0) lseek(r3, 0xfffffffffffffffe, 0x3) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r4, 0xfffffffffffffffe, 0x3) accept4$bt_l2cap(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000100), 0x5000) 01:49:21 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x1, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), 0x0, 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0x4c, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) 01:49:21 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) 01:49:21 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fork() r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r0, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) 01:49:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:49:21 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 589.792058] loop4: detected capacity change from 0 to 264192 01:49:21 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) 01:49:21 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x1, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), 0x0, 0x40, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0x4c, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) [ 589.979559] loop4: detected capacity change from 0 to 264192 01:49:21 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() r0 = openat$cdrom(0xffffffffffffff9c, 0x0, 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r0, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) 01:49:21 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmsg$inet(r0, &(0x7f00000015c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x20000000) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000003c0)={'veth0_to_batadv\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$sock_int(r2, 0x1, 0x23, &(0x7f00000001c0), 0x4) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000001, 0x1010, r1, 0x10000000) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000240)={@dev={0xac, 0x14, 0x14, 0x44}, @local}, 0xc) 01:49:21 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 01:49:21 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x1, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0xfffffffffffffde5, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) 01:49:21 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x54) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xc) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) 01:49:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) (fail_nth: 1) [ 590.600797] loop4: detected capacity change from 0 to 32765 [ 590.610343] FAT-fs (loop4): invalid media value (0x17) [ 590.611074] FAT-fs (loop4): Can't find a valid FAT filesystem 01:49:34 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x1, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0xfffffffffffffde5, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) 01:49:34 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:49:34 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() r0 = openat$cdrom(0xffffffffffffff9c, 0x0, 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r0, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) 01:49:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:49:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) (fail_nth: 2) 01:49:34 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xc) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={0x0, 0x101}) 01:49:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:49:34 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 603.174804] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8999 comm=syz-executor.1 01:49:34 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xc) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:49:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) (fail_nth: 3) 01:49:34 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() r0 = openat$cdrom(0xffffffffffffff9c, 0x0, 0x402040, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r0, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) [ 603.312264] FAULT_INJECTION: forcing a failure. [ 603.312264] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 603.314173] CPU: 1 PID: 9104 Comm: syz-executor.0 Not tainted 6.0.0-rc1-next-20220818 #1 [ 603.315314] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1521 [ 603.316472] in_atomic(): 0, irqs_disabled(): 1, non_block: 0, pid: 9104, name: syz-executor.0 [ 603.317553] preempt_count: 0, expected: 0 [ 603.318096] RCU nest depth: 0, expected: 0 [ 603.318652] 2 locks held by syz-executor.0/9104: [ 603.319283] #0: ffff888009259268 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe7/0x100 [ 603.320437] #1: ffff888010146438 (sb_writers#10){.+.+}-{0:0}, at: ksys_write+0x127/0x250 [ 603.321554] irq event stamp: 444 [ 603.322017] hardirqs last enabled at (443): [] __up_console_sem+0x78/0x80 [ 603.323289] hardirqs last disabled at (444): [] dump_stack_lvl+0x2e/0xb3 [ 603.325131] softirqs last enabled at (438): [] __irq_exit_rcu+0x11b/0x180 [ 603.326237] softirqs last disabled at (431): [] __irq_exit_rcu+0x11b/0x180 [ 603.327336] CPU: 1 PID: 9104 Comm: syz-executor.0 Not tainted 6.0.0-rc1-next-20220818 #1 [ 603.330995] syz-executor.0[9104] cmdline: /syz-executor.0 exec [ 603.331879] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 603.333518] Call Trace: [ 603.333900] [ 603.334265] dump_stack_lvl+0x8b/0xb3 [ 603.334824] __might_resched.cold+0x222/0x26b [ 603.335515] down_read_killable+0x75/0x490 [ 603.336180] ? down_read_interruptible+0x490/0x490 [ 603.336923] __access_remote_vm+0xac/0x6f0 [ 603.337581] ? follow_phys+0x2c0/0x2c0 [ 603.338189] ? do_raw_spin_lock+0x121/0x260 [ 603.338820] ? rwlock_bug.part.0+0x90/0x90 [ 603.339469] ? lock_release+0x3b2/0x750 [ 603.340085] ? __up_console_sem+0x47/0x80 [ 603.340746] get_mm_cmdline.part.0+0x214/0x600 [ 603.341451] ? dname_to_vma_addr.isra.0+0x360/0x360 [ 603.342205] ? _raw_spin_unlock_irqrestore+0x33/0x60 [ 603.342963] get_task_cmdline_kernel+0x1e9/0x230 [ 603.343681] dump_stack_print_cmdline.part.0+0x82/0x150 [ 603.344486] ? _atomic_dec_and_lock_irqsave+0x150/0x150 [ 603.345270] ? __wake_up_klogd.part.0+0xc5/0xf0 [ 603.346003] ? dump_stack_print_info+0xc6/0x190 [ 603.346701] dump_stack_print_info+0x185/0x190 [ 603.347389] dump_stack_lvl+0x7f/0xb3 [ 603.347973] should_fail.cold+0x5/0xa [ 603.348571] copyin+0x19/0x120 [ 603.349065] _copy_from_iter+0x1d2/0x1210 [ 603.349697] ? __kmalloc+0x25f/0x450 [ 603.350280] ? _copy_mc_to_iter+0x14a0/0x14a0 [ 603.350935] ? lock_is_held_type+0xd7/0x130 [ 603.351548] ? __virt_addr_valid+0xfe/0x340 [ 603.352201] ? __check_object_size+0x380/0x800 [ 603.352849] kernfs_fop_write_iter+0x194/0x610 [ 603.353511] vfs_write+0x9c3/0xd90 [ 603.354015] ? __ia32_sys_pread64+0x220/0x220 [ 603.354665] ? __fget_files+0x270/0x450 [ 603.355261] ksys_write+0x127/0x250 [ 603.355776] ? __ia32_sys_read+0xb0/0xb0 [ 603.356361] ? syscall_enter_from_user_mode+0x1d/0x50 [ 603.357051] ? syscall_enter_from_user_mode+0x1d/0x50 [ 603.357767] do_syscall_64+0x3b/0x90 [ 603.358322] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 603.359019] RIP: 0033:0x7f14adbb6b19 [ 603.359560] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 603.361999] RSP: 002b:00007f14ab12c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 603.363056] RAX: ffffffffffffffda RBX: 00007f14adcc9f60 RCX: 00007f14adbb6b19 [ 603.364066] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003 [ 603.365065] RBP: 00007f14ab12c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 603.366060] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 603.367062] R13: 00007ffd749508df R14: 00007f14ab12c300 R15: 0000000000022000 [ 603.368113] 01:49:34 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 603.387653] loop4: detected capacity change from 0 to 32765 [ 603.400554] FAT-fs (loop4): invalid media value (0x17) [ 603.401063] FAT-fs (loop4): Can't find a valid FAT filesystem [ 603.427970] syz-executor.0[9104] cmdline: /syz-executor.0 exec [ 603.428856] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 603.430474] Call Trace: [ 603.430836] [ 603.431210] dump_stack_lvl+0x8b/0xb3 [ 603.431773] should_fail.cold+0x5/0xa [ 603.432363] copyin+0x19/0x120 [ 603.432838] _copy_from_iter+0x1d2/0x1210 [ 603.433459] ? __kmalloc+0x25f/0x450 [ 603.433998] ? _copy_mc_to_iter+0x14a0/0x14a0 [ 603.434673] ? lock_is_held_type+0xd7/0x130 [ 603.435313] ? __virt_addr_valid+0xfe/0x340 [ 603.435943] ? __check_object_size+0x380/0x800 [ 603.436634] kernfs_fop_write_iter+0x194/0x610 [ 603.437318] vfs_write+0x9c3/0xd90 [ 603.437839] ? __ia32_sys_pread64+0x220/0x220 [ 603.438521] ? __fget_files+0x270/0x450 [ 603.439109] ksys_write+0x127/0x250 [ 603.439689] ? __ia32_sys_read+0xb0/0xb0 [ 603.440382] ? syscall_enter_from_user_mode+0x1d/0x50 [ 603.441112] ? syscall_enter_from_user_mode+0x1d/0x50 [ 603.441891] do_syscall_64+0x3b/0x90 [ 603.442479] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 603.443240] RIP: 0033:0x7f14adbb6b19 [ 603.443777] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 603.446257] RSP: 002b:00007f14ab12c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 603.447335] RAX: ffffffffffffffda RBX: 00007f14adcc9f60 RCX: 00007f14adbb6b19 [ 603.448335] RDX: 000000000000001c RSI: 0000000020000080 RDI: 0000000000000003 [ 603.449344] RBP: 00007f14ab12c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 603.450349] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 603.451341] R13: 00007ffd749508df R14: 00007f14ab12c300 R15: 0000000000022000 [ 603.452408] 01:49:35 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r0, 0x36d6c000) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x7}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) lseek(r1, 0xfffffffffffffffe, 0x3) 01:49:35 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:49:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000080)=[{0x36, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1c) (fail_nth: 4) 01:49:35 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x54) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:49:35 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x1, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x8, &(0x7f0000000600)=[{&(0x7f0000000180)="19aa170f64d2c05856a93a201e68993ae7d7fdc29737e8d7fc2cabfe0b301acc78e6ee2a77947938996b23f372d121ff847768a6a1a1aaf0c214768e", 0x3c, 0xffffffffffffffff}, {&(0x7f0000000300)="7fdc21192b3ae5b6dbaf95bb38c4bda2f6e510ce0ada7dd66a748cf9045f70dcfd66885c76ac3a89dd59b010fbc3aae82694587ad64bd68007461c4a9a2afec0c15793c9bc6c3788cca2da486c715bb7b4a160230227c12488fd0bb38e45839cbfaae85e68d6acee1ba2c2479b29f40e383d816eb219ad43c174f8c043704eb13f230ec0aa3820d2f4c60a4ff0653cfeb3bdce37be0e281489b564e21682a6fe5fdbd7aac25a032d42d9a0fb4ac7c217a84ef844a9ae414a4ccc2588ffc1635943c7af0b9bb6a2ae3e9a4acf7c6d81a9783a699f91695e20dcb109b4a052e26d9d5972728eeabc1cab5b3bde38", 0xed, 0x2}, {&(0x7f00000001c0)="59e7dbf705b62900bc558cb3636fc86735752cdfd24ac1c3c8d17914ec86", 0x1e, 0xfff}, {&(0x7f0000000200)="4b8094ceac712fb90f7832b5a14b81595d178b7210970cce17d968171e20191d0e23bf5ff1ea6cc0c5", 0x29, 0x3f}, {&(0x7f0000000400), 0x0, 0x401}, {&(0x7f0000000500)="267d86da6ee0e1dee6acde8c29c499bf769db210237d5665e45907b63c2331c1d2664ed24405b6eaa511446782fc5c89ef4119a1858b660192945c82d93090739ce374d0a05da7a3265a39178c588ce12f0feeebf0a448914700cad6850cd12e0f559fcb794e35563add3ec571780f74bd44da3047e483ddd90ec4d6", 0x7c, 0x5}, {&(0x7f0000000580)="82b7715aad21f98d2f3b37817f220e12eb18fe6c4d96be2b8b316dfadcdff124695cb9f165340527845f89f71447c8bf88156a46ba2bc5da25514adca6f45d20a3f45330541ad121d047cae0", 0xfffffffffffffde5, 0x800000000000ecb}, {&(0x7f0000000240)="624657a08fffdca5fad87a18ffe23fe2178c0f5966ace6f89776c083527aaadc32e1cb6cb090e09385a601032ab09446107ea01e068e", 0x36, 0x5}], 0x2000000, &(0x7f00000006c0)={[{@dots}, {@dots}, {@dots}, {@dots}]}) [ 603.605868] FAULT_INJECTION: forcing a failure. [ 603.605868] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 603.606982] CPU: 0 PID: 9243 Comm: syz-executor.0 Tainted: G W 6.0.0-rc1-next-20220818 #1 [ 603.607838] syz-executor.0[9243] cmdline: /syz-executor.0 exec [ 603.608634] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 603.609562] Call Trace: [ 603.609766] [ 603.609959] dump_stack_lvl+0x8b/0xb3 [ 603.610299] should_fail.cold+0x5/0xa [ 603.610609] _copy_to_user+0x2a/0x140 [ 603.610922] simple_read_from_buffer+0xcc/0x160 [ 603.611331] proc_fail_nth_read+0x198/0x230 [ 603.611673] ? proc_tid_comm_permission+0x1c0/0x1c0 [ 603.612079] ? security_file_permission+0xb1/0xe0 [ 603.612509] vfs_read+0x253/0x930 [ 603.612800] ? proc_tid_comm_permission+0x1c0/0x1c0 [ 603.613235] ? kernel_read+0x1c0/0x1c0 [ 603.613545] ? __fget_files+0x270/0x450 [ 603.613877] ksys_read+0x127/0x250 [ 603.614183] ? __ia32_sys_pwrite64+0x220/0x220 [ 603.614553] ? syscall_enter_from_user_mode+0x1d/0x50 [ 603.614960] ? syscall_enter_from_user_mode+0x1d/0x50 [ 603.615388] do_syscall_64+0x3b/0x90 [ 603.615702] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 603.616112] RIP: 0033:0x7f14adb6969c [ 603.616425] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 603.617808] RSP: 002b:00007f14ab12c170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 603.618413] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f14adb6969c [ 603.618957] RDX: 000000000000000f RSI: 00007f14ab12c1e0 RDI: 0000000000000004 [ 603.619524] RBP: 00007f14ab12c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 603.620083] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 603.620649] R13: 00007ffd749508df R14: 00007f14ab12c300 R15: 0000000000022000 [ 603.621233] [ 603.844484] loop4: detected capacity change from 0 to 32765 [ 603.848759] FAT-fs (loop4): invalid media value (0x17) [ 603.849393] FAT-fs (loop4): Can't find a valid FAT filesystem VM DIAGNOSIS: 01:49:35 Registers: info registers vcpu 0 RAX=0000000000000000 RBX=ffff888017f3bfa0 RCX=0000000000000003 RDX=ffff888017f3c018 RSI=1ffff11002fe7807 RDI=ffff888017f3c038 RBP=0000000000000000 RSP=ffff8880451f74d0 R8 =0000000000000014 R9 =0000000000000000 R10=fffffbfff0b5dc6a R11=0000000000000001 R12=ffff888017f3b600 R13=00000000000000a0 R14=ffffffff85405460 R15=0000000000000002 RIP=ffffffff81297962 RFL=00000046 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f67014d0700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000000020c67000 CR3=000000000f160000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff4ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 ffffffffffffffff ffffffffffffffff YMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM03=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM04=0000000000000000 0000000000000000 0000000000000000 00000000000000ff YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=000000000000006d RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff8240ad71 RDI=ffffffff8762c6c0 RBP=ffffffff8762c680 RSP=ffff8880455ff200 R8 =0000000000000001 R9 =000000000000000a R10=000000000000006d R11=0000000000000001 R12=000000000000006d R13=ffffffff8762c680 R14=0000000000000010 R15=ffffffff8240ad60 RIP=ffffffff8240adc9 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f14ab12c700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f14ab12bf78 CR3=000000001e298000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff4ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM03=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffffffffff00 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000