mknod$loop(0x0, 0x6000, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)) creat(&(0x7f0000000080)='./file0\x00', 0x60) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x1) lsetxattr$security_selinux(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140), &(0x7f0000000180)='/usr/sbin/cupsd\x00', 0x10, 0x1) r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) execveat(r0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)=[0x0, &(0x7f0000000240)='!{^#]\x00', &(0x7f0000000300)='/usr/sbin/cupsd\x00'], &(0x7f00000005c0)=[0x0, &(0x7f00000003c0)='*\x00', &(0x7f0000000440)='/usr/sbin/cupsd\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='/usr/sbin/cupsd\x00', &(0x7f0000000580)='\x00'], 0x400) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffd69, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000012c0)='ext2\x00', &(0x7f0000001300)='./file0/file0\x00', 0x1, 0x1, &(0x7f00000013c0)=[{&(0x7f0000001340), 0x0, 0x9}], 0x0, &(0x7f0000001400)={[{@data_ordered}, {@nogrpid}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x2}}, {@test_dummy_encryption}, {@journal_checksum}], [{@euid_eq}]}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000001280)={'\x00', &(0x7f0000001240)=@ethtool_pauseparam={0x12, 0x0, 0x1}})