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", &(0x7f0000000080)="f307aa0ac848d5b21f"}}, &(0x7f0000000100)=0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r2, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x810}, 0x20004004) timer_getoverrun(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x200000, 0x3, 0xfffffff6, 0x2, 0x1, 0x3a, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x1}, 0x48) add_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) [ 270.081340][ T8632] loop0: detected capacity change from 0 to 34721 [ 270.086408][ T8625] FAT-fs (loop3): Unrecognized mount option "euid=00000000000000000000" or missing value 07:57:57 executing program 4: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) [ 270.133606][ T8632] FAT-fs (loop0): Unrecognized mount option "euid=00000000000000000000" or missing value 07:57:57 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x11) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000580), r1) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)=ANY=[@ANYRES16=r0], 0x64}, 0x1, 0x0, 0x0, 0x4000800}, 0x20048800) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:57 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f00000001c0)=0x9, 0x4) timer_create(0x6, &(0x7f00000000c0)={0x0, 0x14, 0x2, @thr={&(0x7f0000000f80)="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", &(0x7f0000000080)="f307aa0ac848d5b21f"}}, &(0x7f0000000100)=0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r2, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x810}, 0x20004004) timer_getoverrun(r1) add_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) 07:57:57 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) msgget$private(0x0, 0x10) 07:57:57 executing program 4: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:57:57 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, 0x0, 0x0, 0x0) 07:57:57 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000080)='./file0\x00', 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:57 executing program 1: msgget$private(0x0, 0x10) 07:57:57 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, 0x0, 0x0, 0x0) 07:57:57 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f00000001c0)=0x9, 0x4) timer_create(0x6, &(0x7f00000000c0)={0x0, 0x14, 0x2, @thr={&(0x7f0000000f80)="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", &(0x7f0000000080)="f307aa0ac848d5b21f"}}, &(0x7f0000000100)) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r1, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x810}, 0x20004004) add_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) 07:57:57 executing program 4: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:57:57 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000080)='./file0\x00', 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 270.232827][ T8658] loop3: detected capacity change from 0 to 34721 [ 270.247602][ T8656] loop0: detected capacity change from 0 to 34721 07:57:57 executing program 1: msgget$private(0x0, 0x0) 07:57:57 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x11) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000580), r0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:57 executing program 4: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:57:57 executing program 5: msgget$private(0x0, 0x10) 07:57:57 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f00000001c0)=0x9, 0x4) timer_create(0x6, &(0x7f00000000c0)={0x0, 0x14, 0x2, @thr={&(0x7f0000000f80)="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", &(0x7f0000000080)="f307aa0ac848d5b21f"}}, &(0x7f0000000100)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) add_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) 07:57:57 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000080)='./file0\x00', 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 270.273042][ T8656] FAT-fs (loop0): Unrecognized mount option "euid=00000000000000000000" or missing value 07:57:57 executing program 5: msgget$private(0x0, 0x10) 07:57:57 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f00000001c0)=0x9, 0x4) timer_create(0x6, &(0x7f00000000c0)={0x0, 0x14, 0x2, @thr={&(0x7f0000000f80)="3f8124c7b623d1f20d2fee8c587b2e2c14094a2a51225f7d59a1d22fd324954356abd79d333450af490eddacc81a1761323f3290a4bf0d108ab6bfe9a7cd468c83fe77645c55ad89fb89d2dcacde87fc58736ca50a80957843c37e6988c228c127a94f626102985b6bbaa9a99e10bb8410410a64b152ec57bebfab2a16070f7f58cd50b3f21667accbda0bf96c85a2617b94e35359e77327bafd3979074592de39ed53cafa3e3d9ac70e302fe2c64fc518250661073076a94f5b61757672d34271a4d0cd9edce0f49a0b82f92c787f497a956bb825e515a95eca428923608e784332980d48272eb5b943f634f3d0b11688d02bf36bf32724ceca3cc6805df6bc9a48300fddfc94e110ca34e95e26ff50d3671e597166ea86a5a7be1163f3c83add7331a1a21260e392d604c76c7a6fb9a8de57164f59c984bac4a0917524f4f147326405863bc1ce8f49c31a56d5c64f7911fe89cecfc1036e309bc81156156a07a9bfa03c9236a4489c74cf8f8016535afd10af2e8c84d890e88d13b6a616092e3243471030eb8876c592f76ab456680096f7826fb61f08bb86d51e4033436f5ab3cb00e77c2b1d82e18504be8b097c48b7c7992257725b65016764a73bf9e37c8ec225188e08f9c5b1f03a63ccbc880dcf9c0167cccd68b749185aa158a1dc0b8abebf0d67a823a281329d94816f064e6b304804e7c98e53cc127062e86cd401437a4ba7425c3c98cf740dc032bc25e8b489c599494814415ccaab85e3baecc47ff632a68831509d137afbc8b53d33451c801d37357df9cd5339bda3bb63feee16c56f847c35378be29a96b95788d2943d0ac6df31ba71c0202ee290e1f105d09dd9b5ad9fc1cf335cbdf4443f822a7452d310c39b0f90451acb47f324c36dfe329b44e47e3ccee66d94562dce07494960c3e7061e40763f36ae3ac5b141d96777fb54d81d401a928d6381fcc7309ce2c759d6817df46ee0014b0ec6e64c3026971a299cbbb2de160eab067563bf0a2486f3737704e6c6b970db0742724c15565e828f18cf799942c24284df43ba1d70efde18a6808f6221dbfa3ae2275fa8f3a1362b874182909c83fcf536b1ae84f908a4827b1eebab97fa45ea8093742dcab88227a17a3ee220c355f624052c34822f381b18bb328f1adf9c9e5b562e8166de29c84466eb363dc4872d8d55d2eccf1a0a3062aca00301c7a81bf4b013231ac44ce7c27412cb3cf40a8c088f31c46deef74b1c98266776f16e20e70d7a609ea5f47622247fa2664ae237c262de6b4b5649ea9dad03f79387ff097a21bf4f7cae664a22c8eccfc0025104108b00baeb6600c9239921af4b2d5674d812313845a2689568b7213d0a54d0da8edd39a62e364748b6219443c6a42262ac8b6ded3d67ce03a4638c5d8c4c6845bb98da4cac4ee1f14537d7342018e082b823b315d03cefc595d19e1144a7dfb9c5eba3a860bb3b5882f99de79204e8a33030952a13bb2dbc108317b15c8834a8b73c1c82fc67bae9f46fe2f62b381df64fc6e138bf41ef4683c1dfd4104d7d301fcb5d7ced97262eb00df43f034f34e916fa29d3304965b272bfe838d375d5694db0d6fbd7a38ae6310a89542806a08f6fc27cf64464219dd34de8c47bf1ec37d62540bf7d1ec32caca01d4cf6a00786f22661cc8211c5ce66d3e48ed92e1db96003f3548c8674467bdd3aadf0eee5e1e60191d157c51cae69e569550c08219bb45a3da58a19b22b3078486758d59cc3fe514b38d9c97a2bc7f2ef7ab15bfa4f30b4d5b74d004fd522e4d9cb933a862df6fc7142c4a7a2b90f865269c28399dd4ae8bf95dc2912704389407f1290b5a6a0111cc93f7ae4d81435d8b4f63d0a5d07ef3bb9b1062fa5c1f64ad021388f761b035272e17ef6d2b86e0825b96ebdfd3a0ae352279d5996c6122401b00b875f587e73501e23c2ad70339e91c3ff456b9bc47f22dcd4cbe0d05e6a8033196055fdc2dda1b459cb2c606feda9187efdc4959cf7fe267c803a5905dc03a4178f488e04a7a79ea7e7089297d75b117dce95dbc41330e68c41277a07d7e655824a126974260e18d96d36bb8ea877a2fa7bed7118c6ffbf4f103846904ddf477a2909a82fbbdb4b7f8fd54fb01baeb23a0d5e26dcbd978e22b318d9cae98202b0647571f0035165b44a729e0fb499cee43f96b9f7b75da9c571c65330359e9718f872f07b20053844be7b2865c74bd4e26a4484d9b84a0087c39af9a8799f5818a0b6e975dd7821800ad3084e53d61c8a7d4b0ff64ffec0c2703c0a90a2283d9af17520ed1fb38e1663ee68652469a88fc44d4bfb26d30c5a7c44a70e1a3095aba3759c30ef92dd0a91dc64e80fc70867c217921945da086f43bf9b436619e236754d8b77d4b73f15c203fb38daed502148ae13eb81943ec5d6971687d6dbab4567e48f0498437a4b3eb4e66340ab5c2beb97c24070feb2a3bf9f4144e2d17e428aebb0ee0f0a63e1ece4862f54c8d133b1ff2fe9ee39fa0eab3b766dfc114fbac0ff8587a93fa854f01aebbe59c3b1206ac57965448fd7d9fac64fd9bca588b3c626984bc80f22c573dbacbc8541a6b9b3accc2e21ab1eeb70eff370cc1f2170a66996cf1291147bb28b8de8232afa5268d06bbe2c2b7971562cb7e21ae711a3b87448813814a6637c7fc25cf965acd7773b5ee083fcdda187a678a8e436f95d36645e68c5664ef032907a80c2116e9f09ab65d7eaa0990daf52d3aeb8310098dedd1ae48c2659fe41fb2da4691f879f33af576ec9fb5499ac89161f3a8af8d881a02d873ba0b7007246cab41899dbf0b103a80f267518462c0f1251e373c4bd80e95aa0e124577dcf200e2eeefa4f7c072087a8ec3587e41b46e96332f8df607c3f04d6908de0e1173ed34ec90d8f1d4f9bc498b88fccea7b6a22c3a5af45fb32d3399f735d684510b554f8505ea003a1383e5e4b885e33feba6bf99cccbbd0c35cdb88096d2aadc0bf9f0f1f7f5a2ecfcc465366a1b4c8938c56776b25db5fc8d9c16e1091dfc4e3f43b6c7ce8cc5139726bffdee1d9172acfb0f8fa917ea44968b77ee5bb419b1cb00b40f4b81963a2ba3e17b3c5ed128b2b39f31f1a2a0e56f320424f0b21a4e0b8a12785d5bb7de4eed36ae34de9c93b4b8bd0cda7b97815549d76225812b88814ef3a89e21abd25cc9b545b48fa33451a54e5e5ad457f664d3397a2047fa92390f72219ecdb87d41303a07aea949a3d6b647447d031c4c992975b5f2c4b4ae7167fc350831a280f902a866ace52b6782dc5a9297453f601dfa05ddb33db0b9e62ce626e01da3193f414aa9e250028e452fa37cacfa12bef52264d69af694b1784e9c0c26d006dcff245cac1037cd6e9372d9c206f391b2e5554ef930ef5a4e27f4aaf3a1c454524413e06fee76bda8a32cdf812059c9277d2be340f01a74cf3d68b353aa14a32501696d82903a6b18a1020d8601529c0cd388951a9c7419f9d18145c1d1a6d92dfc1b14c6dc97d77d0989bbb0f977874f22c6f0c7e89b06549fea88535797f31b473342073fff9995f01bcd37182405022843561baaa382dc4bf9a16f7534d4e2acb251e383b112efcf63faf531985ba64eff88fc6d3e8d5966a0fce94cf70647421016057b4c6f7d4fe36b94e495b9bc83d17662622cec5fd43e1dd43046505f9aaeec7d2f379071ab1b3b1d532be5b1aed94f5cff5a2d049f280e931194ba84b76fa1383f193859101e71bb9a2ce7dacd3c9d557a2e59314bc85f6a9af8c89b7f2ed0d7f60f8700f0442ef5f801777195ee1b263672c7c90df2b1e56b2093ecbb53009bc6d34a5065ed02802f6710d8e2c9fa04654b167712a1f4057ba44f98c138bf0f25d8fd52cf48f8082f879356ca030c1de4d8d606c0c0418a4dbe8b2e65d2c4dee57a1db34f9f7a217b41dc8996bf119dbb49a16496b41b18c8be6e20b619ce827a7bcc459fdb2ba312162a3414b0d742a5adff2e79d1ec5850f9769a8385adcdcb09d2421223bdc754d4886b9119823b8696c4f0cc339bf9c68068168649173ae215514df5129c78b8884cb522d4190cc519d9c9811d3cd9eb1b9936f1d8d0fdf6390e03bad67c8ba63de153be2d25940ce3c7b9c11c5379ed3cade0dd65934a3a9595ec0d965af6bfda68e685750c9405a6b97d3dd67b0f039b1ab6c2d087fd7649010ce8b16f5eef8ddf890f1029ab826b94c29ef1f939503634100d3f661a4c22a9a9f9fc640af91d6724ee1031ffee702725476a3ca9dc83e9d76aaa62fa94a2717933904161d406e5f84a4923b4f95a494b1c02f314461e66edf30441b1c826625266a44a2c6b64bb31a95b245af68475adc6d5acfd49eb44165f3977b3ea7d1b08a82592d5cfe8389951745d9668d15e622c9a87155f47efcf9ed310b22b203cc50c997aa42dcb929059dc54b1de74e1ad37a68201bd8d7ae96774b7accde809a93d8c126e6236b1e8267ad54e3c838274b4a7cfc982ac752363c43290e06c61079d2ca1380fa6e931b253d8056726e57a1a2b7a9b4d0039f38571e22bcba628648878e3de3af94cc980123d7757a34d9034f74480f39a0286e8b04868b4cab4b4d100bd83564801014c9a84e0489553f56249570ef3b1a8d653cee827ff75811779765034ab54057fc575c0a96d5c7b8f6be585bc9267f3914b5ae4ea9833aaaf381e83228b56f749a7ed08a70ceead75046aa9c5d0aafd8c7a685a5a33f3d734e6ceeddc84dd320e295b576c9cb073dbc8f9afd0844b06ae7c165333108684ae0196bbf2573bd1867eb070dbfbdc84d37927a233628bfc48aa285ecf3daaba717853499427d7c19f9a4ec75d4acd06737b29d47367e8c1357dd438a0480ec5a498627f149e0b08164ce5ffc927b56d2d4b292667b877bd6f7ac98eba1ac864ea8cb694232389b56cc7ae8eb745a57fb981c542dee9d4204ea2610033a055a70876b182eabed4fdc0b40e54554c8c7475c1248a9ab00428de76efe4cf75de71618bcd4006e95ca83e4b5052fddeb8e2ceede48563cfb60ac8504d7346e26e695430db44653a61e102a1750667562cf639a12157e358cf6704791df744c9a68897616865a2d337dfebacac6848da5b292eaf2368ba507eb4aca88c45ec0f0e39a77c0a6b73e76a4350e79fcb4c8d59c1a0b0f4bb0210ce29d49ab07249026e3efb87c3540d982dcda593de735553b34881572550837f6bee20c91202a1da65c5aea90dffa45b907212b9cb6aa181a670f23f1f87ce6c8dcaa6e96d982ae9647a69b6b5dd44335b18173bcf8b6d3efc65ac811ec841b09e731ce18f4b4c9f4f4ebd359433b5059bbc56b977bf3cc732ca5bb0367b059734085184f6af34b1bd8401a2725c9a41a935db324ee54bf66b589b8d06688d1713502da03d8c2e94071d7b37d1b2b06d1c8f9ada9dc4cafa3ffeae5b755c380f4cf8d9b2f9ddbb221ae1d74a5eb4ae2b69c0b3af0dfe3fea1dabfad0c86769647c1e23aa94d467be6b629294ff58140e65fe7a227935b3487a8da59d01c6fdebdafb9eabcc8a5380280909cf442736591807d1b193677f27afd33366318924b895ba381dfe38b7592ae83f4034f1e560b16a178c207e9f624e419e9848de83ff523eee390d0e7b2806548288fb11df0a4e1449675a4994077e37f39168e94fc02f93c23f9a9eb907e97dde0fdaa2e029822e1d6ba8ec961995b2c9d71a179b9dc6d13a2af218074b9cd762ce2f4b1900af4a553774bfd6ea1eeacf3ad8ea1511ff18b0a4b10900045b55d54221298c16cc7027cc2ee4c1c41", &(0x7f0000000080)="f307aa0ac848d5b21f"}}, &(0x7f0000000100)) add_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) 07:57:57 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x11) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000580), r0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:57 executing program 4: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:57:57 executing program 5: msgget$private(0x0, 0x10) [ 270.318632][ T8675] loop1: detected capacity change from 0 to 34721 07:57:57 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000080)='./file0\x00', 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:57 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000080)='./file0\x00', 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:57 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f00000001c0)=0x9, 0x4) add_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) 07:57:57 executing program 4: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:57:57 executing program 5: msgget$private(0x0, 0x0) [ 270.366984][ T8686] loop0: detected capacity change from 0 to 34721 [ 270.378718][ T8686] FAT-fs (loop0): Unrecognized mount option "euid=00000000000000000000" or missing value [ 270.405764][ T8693] loop3: detected capacity change from 0 to 34721 07:57:58 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x11) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:58 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) add_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) 07:57:58 executing program 4: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, 0x0, 0x1, 0x70bd29, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:57:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), 0x0, 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:58 executing program 4: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, 0x0, 0x1, 0x70bd29, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:57:58 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000080)='./file0\x00', 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:58 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) add_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) [ 270.424141][ T8697] loop1: detected capacity change from 0 to 34721 [ 270.464328][ T8703] loop0: detected capacity change from 0 to 34721 07:57:58 executing program 4: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, 0x0, 0x1, 0x70bd29, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:57:58 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000080)='./file0\x00', 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:58 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) add_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) 07:57:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), 0x0, 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:58 executing program 4: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r0, 0x0, 0x70bd29, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) [ 270.494568][ T8703] FAT-fs (loop0): Unrecognized mount option "euid=00000000000000000000" or missing value [ 270.513913][ T8711] loop3: detected capacity change from 0 to 34721 [ 270.520853][ T8713] loop5: detected capacity change from 0 to 34721 07:57:58 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x11) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:58 executing program 2: add_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) 07:57:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), 0x0, 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:58 executing program 4: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r0, 0x0, 0x70bd29, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:57:58 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000080)='./file0\x00', 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 270.571181][ T4310] I/O error, dev loop1, sector 34560 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 270.581783][ T8723] loop1: detected capacity change from 0 to 34721 [ 270.586657][ T4310] I/O error, dev loop1, sector 34560 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 270.597693][ T4310] Buffer I/O error on dev loop1, logical block 34560, async page read [ 270.612801][ T8725] loop3: detected capacity change from 0 to 34721 07:57:58 executing program 2: add_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) 07:57:58 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:58 executing program 4: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r0, 0x0, 0x70bd29, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) [ 270.630252][ T8731] loop0: detected capacity change from 0 to 34721 [ 270.639651][ T8731] FAT-fs (loop0): Unrecognized mount option "euid=00000000000000000000" or missing value [ 270.665413][ T8737] loop5: detected capacity change from 0 to 34721 07:57:58 executing program 2: add_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) 07:57:58 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 270.674054][ T1836] I/O error, dev loop3, sector 34560 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 270.687881][ T4310] I/O error, dev loop1, sector 34560 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 270.707075][ T4303] I/O error, dev loop0, sector 34560 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 07:57:58 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:58 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000080)='./file0\x00', 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:58 executing program 4: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r0, 0x1, 0x0, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:57:58 executing program 2: add_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) [ 270.742328][ T8743] loop1: detected capacity change from 0 to 34721 [ 270.749653][ T8745] loop3: detected capacity change from 0 to 34721 [ 270.756238][ T4310] I/O error, dev loop1, sector 34560 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 270.765740][ T4310] Buffer I/O error on dev loop1, logical block 34560, async page read [ 270.773688][ T8747] loop0: detected capacity change from 0 to 34721 07:57:58 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:58 executing program 2: add_key(&(0x7f0000000140)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) 07:57:58 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 270.783334][ T8745] FAT-fs (loop3): Unrecognized mount option "euid=00000000000000000000" or missing value 07:57:58 executing program 4: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:57:58 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), 0x0, 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 270.833506][ T8747] FAT-fs (loop0): Unrecognized mount option "euid=00000000000000000000" or missing value [ 270.839331][ T8757] loop1: detected capacity change from 0 to 34721 07:57:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:58 executing program 4: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x38, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:57:58 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:58 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000080)='./file0\x00', 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 270.878098][ T8761] loop2: detected capacity change from 0 to 34721 [ 270.903291][ T8763] loop5: detected capacity change from 0 to 34721 07:57:58 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:58 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x11) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:58 executing program 4: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x38, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:57:58 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 270.975503][ T8774] loop2: detected capacity change from 0 to 34721 [ 270.984077][ T8775] loop0: detected capacity change from 0 to 34721 [ 270.998322][ T8774] FAT-fs (loop2): Unrecognized mount option "euid=00000000000000000000" or missing value [ 271.019322][ T8779] loop5: detected capacity change from 0 to 34721 07:57:58 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:58 executing program 4: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x38, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:57:58 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000080)='./file0\x00', 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:58 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:58 executing program 4: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:57:58 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:58 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x11) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:58 executing program 4: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:57:58 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:58 executing program 4: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) [ 271.092519][ T8789] FAT-fs (loop3): Unrecognized mount option "euid=00000000000000000000" or missing value [ 271.124399][ T8793] loop0: detected capacity change from 0 to 34721 07:57:58 executing program 4: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x3c, r0, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x3}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:57:58 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000080)='./file0\x00', 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:58 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x11) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 271.152959][ T8799] loop2: detected capacity change from 0 to 34721 [ 271.165316][ T8799] FAT-fs (loop2): Unrecognized mount option "euid=00000000000000000000" or missing value 07:57:58 executing program 4: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x3c, r0, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:57:58 executing program 4: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x3c, r0, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:57:58 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 271.205629][ T8807] FAT-fs (loop3): Unrecognized mount option "euid=00000000000000000000" or missing value [ 271.217936][ T8809] loop5: detected capacity change from 0 to 34721 [ 271.235917][ T8813] loop2: detected capacity change from 0 to 34721 07:57:58 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:58 executing program 4: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x3c, r0, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:57:58 executing program 4: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x3c, r0, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x3}}]}, 0x3c}}, 0x20000000) 07:57:58 executing program 4: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x3c, r0, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x3}}]}, 0x3c}}, 0x0) [ 271.251014][ T8813] FAT-fs (loop2): Unrecognized mount option "euid=00000000000000000000" or missing value 07:57:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:58 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x11) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 271.303280][ T8823] loop0: detected capacity change from 0 to 34721 [ 271.336993][ T8831] loop2: detected capacity change from 0 to 34721 07:57:58 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), 0x0, 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:58 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:58 executing program 4: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x3c, r0, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x3}}]}, 0x3c}}, 0x0) 07:57:58 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {0x0, 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:58 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:58 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000080)='./file0\x00', 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:58 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:58 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 271.343986][ T8829] FAT-fs (loop3): Unrecognized mount option "euid=00000000000000000000" or missing value [ 271.347975][ T8831] FAT-fs (loop2): Unrecognized mount option "euid=00000000000000000000" or missing value [ 271.388991][ T8837] loop4: detected capacity change from 0 to 34721 07:57:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000080)='./file0\x00', 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000080)='./file0\x00', 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 271.426888][ T8845] loop2: detected capacity change from 0 to 34721 [ 271.426902][ T8844] loop0: detected capacity change from 0 to 34721 [ 271.443235][ T8847] loop1: detected capacity change from 0 to 34721 [ 271.451092][ T8845] FAT-fs (loop2): Unrecognized mount option "euid=00000000000000000000" or missing value [ 271.461946][ T8849] FAT-fs (loop3): Unrecognized mount option "euid=00000000000000000000" or missing value 07:57:59 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), 0x0, 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000080)='./file0\x00', 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {0x0, 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000080)='./file0\x00', 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000080)='./file0\x00', 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 271.486380][ T8851] loop4: detected capacity change from 0 to 34721 [ 271.514625][ T8857] loop0: detected capacity change from 0 to 34721 07:57:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), 0x0, 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 271.536717][ T8860] FAT-fs (loop3): Unrecognized mount option "euid=00000000000000000000" or missing value [ 271.537089][ T8861] loop2: detected capacity change from 0 to 34721 [ 271.570315][ T8865] loop0: detected capacity change from 0 to 34721 07:57:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), 0x0, 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 271.592279][ T8867] loop1: detected capacity change from 0 to 34721 [ 271.596806][ T8869] loop4: detected capacity change from 0 to 34721 07:57:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), 0x0, 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {0x0, 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), 0x0, 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 271.641852][ T8873] FAT-fs (loop3): Unrecognized mount option "euid=00000000000000000000" or missing value [ 271.656510][ T8877] loop0: detected capacity change from 0 to 34721 [ 271.677455][ T8877] FAT-fs (loop0): Unrecognized mount option "euid=00000000000000000000" or missing value 07:57:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 271.695871][ T8882] loop1: detected capacity change from 0 to 34721 [ 271.707008][ T8886] loop4: detected capacity change from 0 to 34721 [ 271.717264][ T8887] FAT-fs (loop3): Unrecognized mount option "euid=00000000000000000000" or missing value [ 271.734830][ T8889] loop2: detected capacity change from 0 to 34721 07:57:59 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {0x0, 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, 0x0) 07:57:59 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 271.743610][ T8889] FAT-fs (loop2): Unrecognized mount option "euid=00000000000000000000" or missing value 07:57:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, 0x0) 07:57:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {0x0, 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 271.814587][ T8901] loop4: detected capacity change from 0 to 34721 [ 271.830437][ T8905] FAT-fs (loop0): Unrecognized mount option "euid=00000000000000000000" or missing value [ 271.836541][ T8908] loop5: detected capacity change from 0 to 34721 [ 271.842252][ T8909] loop1: detected capacity change from 0 to 34721 07:57:59 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, 0x0) [ 271.910904][ T8915] FAT-fs (loop2): Unrecognized mount option "euid=00000000000000000000" or missing value [ 271.914036][ T8917] FAT-fs (loop0): Unrecognized mount option "euid=00000000000000000000" or missing value [ 271.934789][ T8919] loop5: detected capacity change from 0 to 34721 07:57:59 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {0x0, 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 271.956395][ T8922] loop1: detected capacity change from 0 to 34721 07:57:59 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 271.999421][ T8931] FAT-fs (loop2): Unrecognized mount option "euid=00000000000000000000" or missing value 07:57:59 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 272.045988][ T8935] FAT-fs (loop0): Unrecognized mount option "euid=00000000000000000000" or missing value [ 272.052321][ T8937] loop5: detected capacity change from 0 to 34721 [ 272.069426][ T8939] loop1: detected capacity change from 0 to 34721 [ 272.085844][ T8943] FAT-fs (loop3): Unrecognized mount option "euid=00000000000000000000" or missing value 07:57:59 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06a", 0x73, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 272.087542][ T8945] FAT-fs (loop2): Unrecognized mount option "euid=00000000000000000000" or missing value 07:57:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 272.145730][ T8947] FAT-fs (loop0): Unrecognized mount option "euid=00000000000000000000" or missing value [ 272.169489][ T8950] FAT-fs (loop3): Unrecognized mount option "euid=00000000000000000000" or missing value [ 272.173980][ T8951] FAT-fs (loop2): Unrecognized mount option "euid=00000000000000000000" or missing value [ 272.179683][ T8953] loop5: detected capacity change from 0 to 34721 07:57:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 272.201907][ T8955] loop1: detected capacity change from 0 to 34721 [ 272.217191][ T8959] FAT-fs (loop0): Unrecognized mount option "euid=00000000000000000000" or missing value 07:57:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}]}) [ 272.255401][ T8961] FAT-fs (loop3): Unrecognized mount option "euid=00000000000000000000" or missing value [ 272.261115][ T8963] FAT-fs (loop2): Unrecognized mount option "euid=00000000000000000000" or missing value [ 272.274505][ T8965] FAT-fs (loop0): Unrecognized mount option "euid=00000000000000000000" or missing value 07:57:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}]}) [ 272.298713][ T8967] FAT-fs (loop3): Unrecognized mount option "euid=00000000000000000000" or missing value [ 272.320847][ T8971] loop1: detected capacity change from 0 to 34721 [ 272.344856][ T8973] FAT-fs (loop0): Unrecognized mount option "euid=00000000000000000000" or missing value 07:57:59 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {0x0, 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:57:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, 0x0) 07:57:59 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 272.356428][ T8975] FAT-fs (loop2): Unrecognized mount option "euid=00000000000000000000" or missing value [ 272.366582][ T8979] FAT-fs (loop3): Unrecognized mount option "euid=00000000000000000000" or missing value [ 272.366748][ T8977] loop5: detected capacity change from 0 to 34721 07:57:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}]}) 07:58:00 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06a", 0x73, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:00 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 272.412373][ T8981] loop4: detected capacity change from 0 to 34721 [ 272.442553][ T8987] FAT-fs (loop3): Unrecognized mount option "euid=00000000000000000000" or missing value 07:58:00 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, 0x0) 07:58:00 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {0x0, 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}]}) [ 272.460861][ T8989] FAT-fs (loop2): Unrecognized mount option "euid=00000000000000000000" or missing value [ 272.469048][ T8991] loop1: detected capacity change from 0 to 34721 [ 272.482121][ T8993] loop5: detected capacity change from 0 to 34721 07:58:00 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b", 0x3a, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:00 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 272.511261][ T8995] FAT-fs (loop3): Unrecognized mount option "euid=00000000000000000000" or missing value [ 272.514272][ T8997] loop4: detected capacity change from 0 to 34721 [ 272.532787][ T8999] FAT-fs (loop2): Unrecognized mount option "euid=00000000000000000000" or missing value 07:58:00 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {0x0, 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:00 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, 0x0) 07:58:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}]}) 07:58:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, 0x0) [ 272.562706][ T9003] loop1: detected capacity change from 0 to 34721 [ 272.591171][ T9005] FAT-fs (loop3): Unrecognized mount option "euid=00000000000000000000" or missing value [ 272.605640][ T9009] loop5: detected capacity change from 0 to 34721 07:58:00 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, 0x0) 07:58:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}]}) 07:58:00 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:00 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 272.612327][ T9011] loop4: detected capacity change from 0 to 34721 [ 272.640497][ T9013] FAT-fs (loop3): Unrecognized mount option "euid=00000000000000000000" or missing value 07:58:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}]}) 07:58:00 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, 0x0) 07:58:00 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 272.667159][ T9018] loop1: detected capacity change from 0 to 34721 [ 272.688404][ T9021] loop5: detected capacity change from 0 to 34721 [ 272.699002][ T9023] FAT-fs (loop3): Unrecognized mount option "euid=00000000000000000000" or missing value 07:58:00 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}]}) [ 272.721619][ T9025] loop4: detected capacity change from 0 to 34721 07:58:00 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:00 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 272.762401][ T9029] loop1: detected capacity change from 0 to 34721 [ 272.771945][ T9031] FAT-fs (loop3): Unrecognized mount option "euid=00000000000000000000" or missing value [ 272.783968][ T9033] FAT-fs (loop0): Unrecognized mount option "euid=00000000000000000000" or missing value [ 272.802583][ T9035] loop5: detected capacity change from 0 to 34721 07:58:00 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b", 0x3a, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:00 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}]}) [ 272.833410][ T9037] loop4: detected capacity change from 0 to 34721 [ 272.842134][ T9039] FAT-fs (loop2): Unrecognized mount option "euid=00000000000000000000" or missing value [ 272.862692][ T9041] FAT-fs (loop0): Unrecognized mount option "euid=00000000000000000000" or missing value [ 272.864903][ T9043] FAT-fs (loop3): Unrecognized mount option "euid=00000000000000000000" or missing value 07:58:00 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:00 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:00 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}]}) [ 272.886462][ T9045] loop5: detected capacity change from 0 to 34721 [ 272.918907][ T9048] FAT-fs (loop2): Unrecognized mount option "euid=00000000000000000000" or missing value 07:58:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}]}) [ 272.928956][ T9049] FAT-fs (loop0): Unrecognized mount option "euid=00000000000000000000" or missing value [ 272.932188][ T9051] FAT-fs (loop3): Unrecognized mount option "euid=00000000000000000000" or missing value [ 272.945457][ T9053] loop1: detected capacity change from 0 to 34721 [ 272.965715][ T9055] loop4: detected capacity change from 0 to 34721 07:58:00 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:00 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}]}) 07:58:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:00 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06a", 0x73, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 272.983790][ T9057] FAT-fs (loop3): Unrecognized mount option "dont_hash" or missing value 07:58:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}]}) [ 273.022188][ T9060] FAT-fs (loop0): Unrecognized mount option "euid=00000000000000000000" or missing value [ 273.023344][ T9061] loop5: detected capacity change from 0 to 34721 [ 273.046527][ T9063] FAT-fs (loop2): Unrecognized mount option "euid=00000000000000000000" or missing value [ 273.065511][ T9067] loop1: detected capacity change from 0 to 34721 07:58:00 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}]}) 07:58:00 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}]}) 07:58:00 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 273.065601][ T9066] FAT-fs (loop3): Unrecognized mount option "euid=00000000000000000000" or missing value [ 273.084079][ T9069] loop4: detected capacity change from 0 to 34721 07:58:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}]}) 07:58:00 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 273.116555][ T9073] FAT-fs (loop2): Unrecognized mount option "euid=00000000000000000000" or missing value [ 273.117287][ T9072] FAT-fs (loop0): Unrecognized mount option "euid=00000000000000000000" or missing value [ 273.137172][ T9075] FAT-fs (loop3): Unrecognized mount option "euid=00000000000000000000" or missing value [ 273.140923][ T9077] loop5: detected capacity change from 0 to 34721 07:58:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:00 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}]}) 07:58:00 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:00 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}]}) [ 273.172715][ T9081] FAT-fs (loop2): Unrecognized mount option "euid=00000000000000000000" or missing value [ 273.197270][ T9083] FAT-fs (loop3): Unrecognized mount option "euid=00000000000000000000" or missing value 07:58:00 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}]}) 07:58:00 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:00 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}]}) [ 273.220831][ T9085] FAT-fs (loop2): Unrecognized mount option "euid=00000000000000000000" or missing value [ 273.233369][ T9087] FAT-fs (loop0): Unrecognized mount option "euid=00000000000000000000" or missing value [ 273.241927][ T9090] loop4: detected capacity change from 0 to 34721 [ 273.255154][ T9093] loop5: detected capacity change from 0 to 34721 07:58:00 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:00 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:00 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}]}) [ 273.287064][ T9097] FAT-fs (loop0): Unrecognized mount option "euid=00000000000000000000" or missing value [ 273.289309][ T9099] FAT-fs (loop2): Unrecognized mount option "euid=00000000000000000000" or missing value 07:58:00 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}]}) 07:58:00 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}]}) [ 273.327903][ T9103] FAT-fs (loop0): Unrecognized mount option "euid=00000000000000000000" or missing value [ 273.347491][ T9105] FAT-fs (loop2): Unrecognized mount option "euid=00000000000000000000" or missing value 07:58:00 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}]}) [ 273.383124][ T9108] loop5: detected capacity change from 0 to 34721 [ 273.397421][ T9111] FAT-fs (loop2): Unrecognized mount option "euid=00000000000000000000" or missing value [ 273.401329][ T9113] FAT-fs (loop0): Unrecognized mount option "euid=00000000000000000000" or missing value [ 273.422076][ T9115] loop1: detected capacity change from 0 to 34721 07:58:01 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}]}) 07:58:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}]}) 07:58:01 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {0x0, 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}]}) [ 273.434744][ T9117] loop4: detected capacity change from 0 to 34721 [ 273.456863][ T9120] FAT-fs (loop2): Unrecognized mount option "euid=00000000000000000000" or missing value [ 273.457325][ T9121] FAT-fs (loop0): Unrecognized mount option "euid=00000000000000000000" or missing value 07:58:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}]}) 07:58:01 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}]}) 07:58:01 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}]}) [ 273.503692][ T9125] FAT-fs (loop2): Unrecognized mount option "euid=00000000000000000000" or missing value [ 273.524350][ T9129] FAT-fs (loop0): Unrecognized mount option "euid=00000000000000000000" or missing value [ 273.546248][ T9131] loop4: detected capacity change from 0 to 34721 07:58:01 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b", 0x3a, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {0x0, 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}]}) 07:58:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}]}) [ 273.570273][ T9135] FAT-fs (loop2): Unrecognized mount option "euid=00000000000000000000" or missing value [ 273.579061][ T9137] FAT-fs (loop0): Unrecognized mount option "euid=00000000000000000000" or missing value [ 273.590259][ T9139] loop1: detected capacity change from 0 to 34721 07:58:01 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}]}) [ 273.650083][ T9149] FAT-fs (loop0): Unrecognized mount option "euid=00000000000000000000" or missing value [ 273.654933][ T9151] FAT-fs (loop2): Unrecognized mount option "euid=00000000000000000000" or missing value [ 273.681530][ T9155] loop1: detected capacity change from 0 to 34721 07:58:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}]}) 07:58:01 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {0x0, 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), 0x0, 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 273.705607][ T9159] FAT-fs (loop2): Unrecognized mount option "dont_hash" or missing value [ 273.714510][ T9161] loop4: detected capacity change from 0 to 34721 [ 273.719484][ T9163] FAT-fs (loop0): Unrecognized mount option "dont_hash" or missing value 07:58:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 273.754032][ T9165] loop5: detected capacity change from 0 to 34721 [ 273.773975][ T9169] loop2: detected capacity change from 0 to 34721 [ 273.782098][ T9171] FAT-fs (loop0): Unrecognized mount option "euid=00000000000000000000" or missing value 07:58:01 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {0x0, 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {0x0}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x3c, r0, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x3}}]}, 0x3c}}, 0x0) 07:58:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:01 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:01 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) [ 273.803356][ T9175] loop4: detected capacity change from 0 to 34721 [ 273.811340][ T9173] loop1: detected capacity change from 0 to 34721 [ 273.833461][ T9179] FAT-fs (loop0): Unrecognized mount option "euid=00000000000000000000" or missing value 07:58:01 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {0x0}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 0: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x38, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:01 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {0x0, 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:01 executing program 0: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x38, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:01 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {0x0, 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) [ 273.899413][ T9189] loop5: detected capacity change from 0 to 34721 [ 273.900828][ T1836] blk_print_req_error: 14 callbacks suppressed [ 273.900883][ T1836] I/O error, dev loop5, sector 34560 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 273.930342][ T9193] loop1: detected capacity change from 0 to 34721 [ 273.937214][ T9192] loop4: detected capacity change from 0 to 34721 07:58:01 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {0x0}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 0: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x38, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:01 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:01 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 0: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x38, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, 0x0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, 0x0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:01 executing program 0: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x38, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, 0x0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:01 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 0: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x38, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:01 executing program 2: r0 = syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:01 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x38, 0x0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) [ 274.017430][ T9213] loop5: detected capacity change from 0 to 34721 [ 274.032127][ T9219] loop4: detected capacity change from 0 to 34721 [ 274.043336][ T9223] loop1: detected capacity change from 0 to 34721 07:58:01 executing program 2: r0 = syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:01 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x38, 0x0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:01 executing program 2: r0 = syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:01 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x38, 0x0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:01 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:01 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 0: r0 = syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x38, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:01 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:01 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 274.137883][ T9244] loop5: detected capacity change from 0 to 34721 [ 274.141519][ T9247] loop1: detected capacity change from 0 to 34721 [ 274.144648][ T9245] loop4: detected capacity change from 0 to 34721 07:58:01 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:01 executing program 0: r0 = syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x38, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:01 executing program 2: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, 0x0, 0x20000000) 07:58:01 executing program 0: r0 = syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x38, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:01 executing program 2: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, 0x0, 0x20000000) 07:58:01 executing program 0: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x38, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) [ 274.211847][ T9259] loop5: detected capacity change from 0 to 34721 07:58:01 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 2: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, 0x0, 0x20000000) 07:58:01 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 0: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x38, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:01 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 2: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:01 executing program 0: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x38, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:01 executing program 0: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, 0x0, 0x20000000) 07:58:01 executing program 2: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:01 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 0: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, 0x0, 0x20000000) 07:58:01 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 2: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:01 executing program 0: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, 0x0, 0x20000000) 07:58:01 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:01 executing program 2: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:02 executing program 0: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 2: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 2: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 0: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:02 executing program 0: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:02 executing program 2: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, 0x0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:02 executing program 0: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 2: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, 0x0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 0: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:02 executing program 2: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, 0x0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:02 executing program 0: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:02 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r0, 0x0, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 0: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x38, 0x0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r0, 0x0, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) [ 274.579551][ T9341] loop1: detected capacity change from 0 to 34721 [ 274.596634][ T9347] loop4: detected capacity change from 0 to 34721 07:58:02 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {0x0, 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:02 executing program 0: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x38, 0x0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r0, 0x0, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {0x0, 0x0, 0x3f}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:02 executing program 0: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x38, 0x0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x38, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {0x0, 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:02 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {0x0, 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 274.621809][ T9353] loop5: detected capacity change from 0 to 34721 07:58:02 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x38, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 0: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x38, r0, 0x0, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x38, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 0: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x38, r0, 0x0, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) [ 274.709654][ T9369] loop4: detected capacity change from 0 to 34721 [ 274.732443][ T1836] I/O error, dev loop1, sector 34560 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 274.752201][ T9375] loop5: detected capacity change from 0 to 34721 07:58:02 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {0x0, 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:02 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {0x0, 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:02 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {0x0, 0x0, 0x3f}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:02 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x3c, r0, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 0: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x38, r0, 0x0, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x3c, r0, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}}, 0x20000000) 07:58:02 executing program 0: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r0, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {0x0, 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 274.760721][ T9377] loop1: detected capacity change from 0 to 34721 07:58:02 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x3c, r0, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}}, 0x0) 07:58:02 executing program 0: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r0, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r0, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 0: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r0, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {0x0, 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 274.808979][ T9387] loop4: detected capacity change from 0 to 34721 [ 274.825551][ T9391] loop1: detected capacity change from 0 to 34721 07:58:02 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {0x0, 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:02 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {0x0, 0x0, 0x3f}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:02 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r0, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 0: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x38, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8}}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r0, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 0: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x38, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8}}]}, 0x38}}, 0x20000000) 07:58:02 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r0, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {0x0, 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:02 executing program 0: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x38, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, {0x8}}]}, 0x38}}, 0x0) [ 274.872076][ T9401] loop5: detected capacity change from 0 to 34721 07:58:02 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r0, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {0x0, 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:02 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:02 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240), 0x0, 0x3f}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:02 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r0, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) [ 274.936444][ T9414] loop4: detected capacity change from 0 to 34721 [ 274.943628][ T9419] loop1: detected capacity change from 0 to 34721 [ 274.966419][ T9422] loop0: detected capacity change from 0 to 34721 07:58:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x11) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000580), r0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) [ 275.008028][ T9432] loop5: detected capacity change from 0 to 34721 [ 275.014766][ T9433] loop1: detected capacity change from 0 to 34721 07:58:02 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:02 executing program 2: r0 = syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r0, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240), 0x0, 0x3f}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:02 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:02 executing program 2: r0 = syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r0, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 2: r0 = syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r0, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r0, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:02 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r0, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) [ 275.063280][ T9439] loop4: detected capacity change from 0 to 34721 [ 275.080367][ T9443] loop0: detected capacity change from 0 to 34721 [ 275.087646][ T9443] FAT-fs (loop0): Unrecognized mount option "euid=00000000000000000000" or missing value 07:58:02 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x26f8, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5fa8484b7487b143", 0x1e, 0x3f}, {&(0x7f0000000280)="d01f5e17757e55bd94b267561ad28a4252fa66a990c17ac5c200511ad523c49aa6ff4691d9dfddb3a414624b4dfc6e44fb0c770a0880843c2d9b8b0627c012bae877b69eef0e981788df997ec41aad286718f03e34cc584e49cef187243e9ff00bfa2fba5ef10c361687e7ddd86c236c1df06aa1dc9f8981a7e77f7f9b7ddc12a76a5d04e3799cc44a0e769d4e7f2f198f7ffafa0ae4fbbee8de27c741a30fa1eb8d119576c9e97cc8af7518d33c13fecd917651f81ee601a3ee577341b58e4f2a57ff639fb19868e4715e01d750cc0f666374303fd3a3c208e2ee43c258a3342ab827ab76bc", 0xe6, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:02 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240), 0x0, 0x3f}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:02 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r0, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:02 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:02 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:02 executing program 2: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, 0x0, 0x20000000) [ 275.134384][ T9453] loop1: detected capacity change from 0 to 34721 [ 275.145965][ T9457] loop5: detected capacity change from 0 to 34721 [ 275.163605][ T9461] loop0: detected capacity change from 0 to 34721 [ 275.172950][ T9461] FAT-fs (loop0): Unrecognized mount option "euid=00000000000000000000" or missing value 07:58:02 executing program 2: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, 0x0, 0x20000000) 07:58:02 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:02 executing program 2: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, 0x0, 0x20000000) [ 275.218997][ T9468] loop4: detected capacity change from 0 to 34721 [ 275.237274][ T9473] loop1: detected capacity change from 0 to 34721 07:58:02 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893", 0xf, 0x3f}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:02 executing program 2: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:02 executing program 2: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:02 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:02 executing program 2: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:02 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:02 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 275.260701][ T9475] loop0: detected capacity change from 0 to 34721 [ 275.295978][ T9485] loop5: detected capacity change from 0 to 34721 07:58:02 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893", 0xf, 0x3f}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:02 executing program 2: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 2: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:02 executing program 2: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:02 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:02 executing program 2: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) [ 275.365922][ T9499] loop0: detected capacity change from 0 to 34721 [ 275.377815][ T9501] loop5: detected capacity change from 0 to 34721 07:58:03 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:03 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240), 0x0, 0x3f}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:03 executing program 2: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:03 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893", 0xf, 0x3f}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:03 executing program 2: syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:03 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {0x0, 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:03 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, 0x0, 0x0, 0x0) [ 275.412071][ T9510] loop4: detected capacity change from 0 to 34721 07:58:03 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r0}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:03 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:03 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r0}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:03 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, 0x0, 0x0, 0x0) 07:58:03 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:03 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {0x0, 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:03 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, 0x0, 0x0, 0x0) 07:58:03 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc893170768d37682cc5f", 0x17, 0x3f}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 275.482516][ T9525] loop4: detected capacity change from 0 to 34721 07:58:03 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r0}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:03 executing program 0: fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 07:58:03 executing program 0: fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 07:58:03 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r0, 0x1}, 0x14}}, 0x20000000) 07:58:03 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:03 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:03 executing program 0: fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 07:58:03 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r0, 0x1}, 0x14}}, 0x0) 07:58:03 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {0x0, 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:03 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, 0x0, 0x0, 0x0) 07:58:03 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) msgget$private(0x0, 0x10) ioctl$PTP_PIN_SETFUNC(0xffffffffffffffff, 0x40603d07, &(0x7f0000000040)={'\x00', 0xff, 0x3, 0xd1a}) [ 275.557465][ T9542] loop4: detected capacity change from 0 to 34721 07:58:03 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b37a90612bc89317", 0x10, 0x3f}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:03 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, 0x0, 0x0, 0x0) 07:58:03 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) msgget$private(0x0, 0x10) ioctl$PTP_PIN_SETFUNC(0xffffffffffffffff, 0x40603d07, &(0x7f0000000040)={'\x00', 0xff, 0x3, 0xd1a}) 07:58:03 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:03 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) msgget$private(0x0, 0x10) ioctl$PTP_PIN_SETFUNC(0xffffffffffffffff, 0x40603d07, &(0x7f0000000040)={'\x00', 0xff, 0x3, 0xd1a}) [ 275.633915][ T9563] loop4: detected capacity change from 0 to 34721 [ 275.662533][ T9567] loop1: detected capacity change from 0 to 34721 07:58:03 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:03 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:03 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, 0x0, 0x0, 0x0) 07:58:03 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r0, 0x1, 0x70bd29, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x3}}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 07:58:03 executing program 2: getsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000000)=""/254, &(0x7f0000000100)=0xfe) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xa, 0x3, 0x9, 0xffffffff, 0x120, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x40, 0x36, 0xda6c, 0x800, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x2, 0xf}, 0x48) 07:58:03 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f852d7768016ad7b3", 0x9, 0x3f}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:03 executing program 0: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 07:58:03 executing program 2: getsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000000)=""/254, &(0x7f0000000100)=0xfe) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xa, 0x3, 0x9, 0xffffffff, 0x120, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x40, 0x36, 0xda6c, 0x800, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x2, 0xf}, 0x48) 07:58:03 executing program 0: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 275.715706][ T9573] loop5: detected capacity change from 0 to 34721 [ 275.725720][ T9576] loop4: detected capacity change from 0 to 34721 07:58:03 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:03 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:03 executing program 2: getsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000000)=""/254, &(0x7f0000000100)=0xfe) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xa, 0x3, 0x9, 0xffffffff, 0x120, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x40, 0x36, 0xda6c, 0x800, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x2, 0xf}, 0x48) 07:58:03 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:03 executing program 0: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 07:58:03 executing program 2: getsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000000)=""/254, &(0x7f0000000100)=0xfe) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xa, 0x3, 0x9, 0xffffffff, 0x120, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 07:58:03 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f85", 0x2, 0x3f}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 275.778497][ T9589] loop1: detected capacity change from 0 to 34721 [ 275.814513][ T9597] loop4: detected capacity change from 0 to 34721 07:58:03 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f0000000280), 0x0, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:03 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x80000407, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = socket(0x22, 0x2, 0x2) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbfb, {0x1, 0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), r1) r2 = socket(0x1f, 0x5, 0x82) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x78, 0x0, 0x10, 0x70bd2a, 0x25dfdbfd, {}, [@L2TP_ATTR_SESSION_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r2}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x2}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_batadv\x00'}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x20}, @L2TP_ATTR_OFFSET={0x6}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x80}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x7fffffff}]}, 0x78}, 0x1, 0x0, 0x0, 0x4114}, 0x800) 07:58:03 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x80000407, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = socket(0x22, 0x2, 0x2) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbfb, {0x1, 0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), r1) r2 = socket(0x1f, 0x5, 0x82) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x78, 0x0, 0x10, 0x70bd2a, 0x25dfdbfd, {}, [@L2TP_ATTR_SESSION_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r2}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x2}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_batadv\x00'}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x20}, @L2TP_ATTR_OFFSET={0x6}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x80}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x7fffffff}]}, 0x78}, 0x1, 0x0, 0x0, 0x4114}, 0x800) 07:58:03 executing program 2: getsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000000)=""/254, &(0x7f0000000100)=0xfe) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xa, 0x3, 0x9, 0xffffffff, 0x120, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 07:58:03 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x80000407, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = socket(0x22, 0x2, 0x2) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbfb, {0x1, 0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), r1) r2 = socket(0x1f, 0x5, 0x82) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x78, 0x0, 0x10, 0x70bd2a, 0x25dfdbfd, {}, [@L2TP_ATTR_SESSION_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r2}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x2}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_batadv\x00'}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x20}, @L2TP_ATTR_OFFSET={0x6}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x80}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x7fffffff}]}, 0x78}, 0x1, 0x0, 0x0, 0x4114}, 0x800) 07:58:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xa, 0x3, 0x9, 0xffffffff, 0x120, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) [ 275.853574][ T9601] loop5: detected capacity change from 0 to 34721 07:58:03 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:03 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x80000407, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = socket(0x22, 0x2, 0x2) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbfb, {0x1, 0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), r1) socket(0x1f, 0x5, 0x82) [ 275.906352][ T9612] loop4: detected capacity change from 0 to 34721 [ 275.913128][ T9614] loop1: detected capacity change from 0 to 34721 07:58:03 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{0x0, 0x0, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:03 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f", 0x1, 0x3f}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:03 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) 07:58:03 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x80000407, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = socket(0x22, 0x2, 0x2) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbfb, {0x1, 0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), r1) 07:58:03 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:03 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x80000407, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = socket(0x22, 0x2, 0x2) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbfb, {0x1, 0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) 07:58:03 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) 07:58:03 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x80000407, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = socket(0x22, 0x2, 0x2) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbfb, {0x1, 0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) socket$nl_generic(0x10, 0x3, 0x10) 07:58:03 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) 07:58:03 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x80000407, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = socket(0x22, 0x2, 0x2) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbfb, {0x1, 0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) 07:58:03 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{0x0, 0x0, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x0, 0x3, 0x9, 0xffffffff, 0x120, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) [ 275.992464][ T9628] loop5: detected capacity change from 0 to 34721 07:58:03 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{0x0, 0x0, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:03 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x80000407, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbfb, {0x1, 0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) 07:58:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x0, 0x3, 0x9, 0xffffffff, 0x120, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 07:58:03 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:03 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240), 0x0, 0x3f}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:03 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{0x0, 0x0, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 276.083777][ T9645] loop5: detected capacity change from 0 to 34721 [ 276.123175][ T9647] loop1: detected capacity change from 0 to 34721 07:58:03 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x80000407, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbfb, {0x1, 0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) 07:58:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x0, 0x3, 0x9, 0xffffffff, 0x120, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 07:58:03 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x80000407, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbfb, {0x1, 0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) 07:58:03 executing program 0: r0 = socket(0x22, 0x2, 0x2) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbfb, {0x1, 0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) 07:58:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xa, 0x0, 0x9, 0xffffffff, 0x120, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 07:58:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xa, 0x0, 0x0, 0xffffffff, 0x120, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) [ 276.182113][ T9657] loop5: detected capacity change from 0 to 34721 07:58:03 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{0x0, 0x0, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:03 executing program 0: r0 = socket(0x0, 0x2, 0x2) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbfb, {0x1, 0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) 07:58:03 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:03 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{0x0, 0x0, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:03 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240), 0x0, 0x3f}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xa, 0x0, 0x0, 0x0, 0x120, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 07:58:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 07:58:03 executing program 0: r0 = socket(0x0, 0x2, 0x2) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbfb, {0x1, 0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) 07:58:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 07:58:03 executing program 0: r0 = socket(0x0, 0x2, 0x2) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbfb, {0x1, 0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) 07:58:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) [ 276.267640][ T9676] loop1: detected capacity change from 0 to 34721 [ 276.284408][ T9684] loop5: detected capacity change from 0 to 34721 07:58:03 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240), 0x0, 0x3f}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:03 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0), 0x0, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:03 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:03 executing program 0: r0 = socket(0x22, 0x0, 0x2) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbfb, {0x1, 0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) 07:58:03 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0), 0x0, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xa, 0x0, 0x0, 0x0, 0x120, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 07:58:03 executing program 0: r0 = socket(0x22, 0x0, 0x2) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbfb, {0x1, 0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) 07:58:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xa, 0x0, 0x0, 0x0, 0x120}, 0x48) 07:58:03 executing program 0: r0 = socket(0x22, 0x0, 0x2) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbfb, {0x1, 0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) 07:58:03 executing program 0: r0 = socket(0x22, 0x2, 0x0) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbfb, {0x1, 0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) 07:58:03 executing program 2: r0 = socket(0x22, 0x0, 0x2) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbfb, {0x1, 0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) [ 276.370304][ T9702] loop4: detected capacity change from 0 to 34721 [ 276.400562][ T1836] I/O error, dev loop1, sector 34560 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 07:58:03 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:04 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af5d3cf3f69e2ac8f50955098efb44c1708f511a319ada704f9a00a184a289", 0x7b}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 276.418442][ T9712] loop5: detected capacity change from 0 to 34721 07:58:04 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0), 0x0, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:04 executing program 2: r0 = socket(0x22, 0x0, 0x2) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbfb, {0x1, 0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) 07:58:04 executing program 0: r0 = socket(0x22, 0x2, 0x0) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbfb, {0x1, 0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) 07:58:04 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0), 0x0, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:04 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:04 executing program 2: r0 = socket(0x22, 0x0, 0x2) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbfb, {0x1, 0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) 07:58:04 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:04 executing program 0: r0 = socket(0x22, 0x2, 0x0) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbfb, {0x1, 0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) 07:58:04 executing program 2: socket(0x22, 0x0, 0x2) [ 276.443776][ T9715] loop1: detected capacity change from 0 to 34721 [ 276.472170][ T9721] loop4: detected capacity change from 0 to 34721 07:58:04 executing program 0: socket(0x22, 0x2, 0x2) sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbfb, {0x1, 0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) 07:58:04 executing program 0: socket(0x22, 0x2, 0x2) sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbfb, {0x1, 0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) 07:58:04 executing program 2: socket(0x0, 0x0, 0x2) [ 276.544858][ T9734] loop1: detected capacity change from 0 to 34721 [ 276.553256][ T9740] loop5: detected capacity change from 0 to 34721 [ 276.560221][ T9742] loop4: detected capacity change from 0 to 34721 07:58:04 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0), 0x0, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:04 executing program 0: socket(0x22, 0x2, 0x2) sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbfb, {0x1, 0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) 07:58:04 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:04 executing program 2: socket(0x0, 0x0, 0x2) 07:58:04 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{0x0, 0x0, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:04 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0), 0x0, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:04 executing program 0: r0 = socket(0x22, 0x2, 0x2) sendmsg$AUDIT_TTY_SET(r0, 0x0, 0x24008000) 07:58:04 executing program 2: socket(0x0, 0x0, 0x2) 07:58:04 executing program 0: r0 = socket(0x22, 0x2, 0x2) sendmsg$AUDIT_TTY_SET(r0, 0x0, 0x24008000) 07:58:04 executing program 2: socket(0x22, 0x0, 0x0) 07:58:04 executing program 0: r0 = socket(0x22, 0x2, 0x2) sendmsg$AUDIT_TTY_SET(r0, 0x0, 0x24008000) 07:58:04 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 276.654477][ T9763] loop4: detected capacity change from 0 to 34721 [ 276.666927][ T9766] loop1: detected capacity change from 0 to 34721 [ 276.692634][ T9770] loop5: detected capacity change from 0 to 34721 07:58:04 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c", 0x71, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:04 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{0x0, 0x0, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:04 executing program 2: socket(0x22, 0x0, 0x0) 07:58:04 executing program 0: r0 = socket(0x22, 0x2, 0x2) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbfb, {0x1, 0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) 07:58:04 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c", 0x71, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:04 executing program 2: socket(0x22, 0x0, 0x0) 07:58:04 executing program 0: r0 = socket(0x22, 0x2, 0x2) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) 07:58:04 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {0x0}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:04 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0), 0x0, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:04 executing program 0: r0 = socket(0x22, 0x2, 0x2) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) 07:58:04 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{0x0, 0x0, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 276.759788][ T9775] loop4: detected capacity change from 0 to 34721 [ 276.797253][ T9787] loop1: detected capacity change from 0 to 34721 07:58:04 executing program 0: r0 = socket(0x22, 0x2, 0x2) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) 07:58:04 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0), 0x0, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:04 executing program 0: r0 = socket(0x22, 0x2, 0x2) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) 07:58:04 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0), 0x0, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:04 executing program 0: r0 = socket(0x22, 0x2, 0x2) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x24008000) [ 276.812516][ T9790] loop5: detected capacity change from 0 to 34721 [ 276.815136][ T9792] loop2: detected capacity change from 0 to 34721 [ 276.842279][ T9797] loop4: detected capacity change from 0 to 34721 07:58:04 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0), 0x0, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:04 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {0x0}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:04 executing program 0: r0 = socket(0x22, 0x2, 0x2) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 07:58:04 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {0x0}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:04 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0), 0x0, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:04 executing program 0: socket(0x0, 0x0, 0x2) [ 276.872914][ T9803] loop1: detected capacity change from 0 to 34721 07:58:04 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0), 0x0, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:04 executing program 0: r0 = socket(0x22, 0x2, 0x0) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbfb, {0x1, 0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) 07:58:04 executing program 0: r0 = socket(0x22, 0x2, 0x0) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbfb, {0x1, 0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) 07:58:04 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0), 0x0, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:04 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 07:58:04 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0), 0x0, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:04 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {0x0}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:04 executing program 0: r0 = socket(0x22, 0x2, 0x0) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbfb, {0x1, 0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) 07:58:04 executing program 0: socket(0x22, 0x2, 0x0) [ 276.924263][ T9812] loop5: detected capacity change from 0 to 34721 [ 276.943513][ T9815] loop4: detected capacity change from 0 to 34721 [ 276.963607][ T9822] loop1: detected capacity change from 0 to 34721 07:58:04 executing program 0: socket(0x0, 0x2, 0x0) 07:58:04 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9", 0x39, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:04 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 07:58:04 executing program 0: socket(0x0, 0x2, 0x0) 07:58:04 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0), 0x0, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:04 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 07:58:04 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0), 0x0, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:04 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) 07:58:04 executing program 0: socket(0x0, 0x2, 0x0) [ 277.031619][ T9831] loop5: detected capacity change from 0 to 34721 [ 277.042273][ T9835] loop4: detected capacity change from 0 to 34721 [ 277.065136][ T9841] loop1: detected capacity change from 0 to 34721 07:58:04 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:04 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) 07:58:04 executing program 0: socket(0x22, 0x0, 0x0) 07:58:04 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)='F', 0x1, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:04 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) 07:58:04 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0), 0x0, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:04 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) [ 277.152008][ T1836] I/O error, dev loop5, sector 34560 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 277.153335][ T9859] loop4: detected capacity change from 0 to 34721 [ 277.170814][ T9863] loop1: detected capacity change from 0 to 34721 [ 277.185725][ T9865] loop5: detected capacity change from 0 to 34721 [ 277.192671][ T9869] loop0: detected capacity change from 0 to 34721 07:58:04 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0), 0x0, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:04 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 07:58:04 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:04 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9", 0x39, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:04 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x80000407, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = socket(0x22, 0x2, 0x2) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbfb, {0x1, 0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), r1) r2 = socket(0x1f, 0x5, 0x82) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x78, 0x0, 0x10, 0x70bd2a, 0x25dfdbfd, {}, [@L2TP_ATTR_SESSION_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r2}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x2}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_batadv\x00'}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x20}, @L2TP_ATTR_OFFSET={0x6}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x80}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x7fffffff}]}, 0x78}, 0x1, 0x0, 0x0, 0x4114}, 0x800) 07:58:04 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c", 0x71, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:04 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 07:58:04 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 07:58:04 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xa}, 0x48) 07:58:04 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0), 0x0, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:04 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x80000407, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = socket(0x22, 0x2, 0x2) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbfb, {0x1, 0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), r1) r2 = socket(0x1f, 0x5, 0x82) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x78, 0x0, 0x10, 0x70bd2a, 0x25dfdbfd, {}, [@L2TP_ATTR_SESSION_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r2}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x2}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_batadv\x00'}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x20}, @L2TP_ATTR_OFFSET={0x6}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x80}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x7fffffff}]}, 0x78}, 0x1, 0x0, 0x0, 0x4114}, 0x800) 07:58:04 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x8, 0xfffffe01, 0x80000001, 0x3, 0x988, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x4}, 0x48) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x10, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @jmp={0x5, 0x1, 0x0, 0xa, 0x6, 0x30, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x2}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffa}, @generic={0x7f, 0x8, 0x3, 0x5, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r1, r2, r3, 0x1, 0x1, 0x1]}, 0x80) [ 277.264543][ T9875] loop1: detected capacity change from 0 to 34721 [ 277.304360][ T9884] loop5: detected capacity change from 0 to 34721 07:58:04 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x80000407, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = socket(0x22, 0x2, 0x2) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbfb, {0x1, 0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), r1) r2 = socket(0x1f, 0x5, 0x82) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x78, 0x0, 0x10, 0x70bd2a, 0x25dfdbfd, {}, [@L2TP_ATTR_SESSION_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r2}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x2}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_batadv\x00'}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x20}, @L2TP_ATTR_OFFSET={0x6}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x80}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x7fffffff}]}, 0x78}, 0x1, 0x0, 0x0, 0x4114}, 0x800) 07:58:04 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:04 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x8, 0xfffffe01, 0x80000001, 0x3, 0x988, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x4}, 0x48) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x10, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @jmp={0x5, 0x1, 0x0, 0xa, 0x6, 0x30, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x2}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffa}, @generic={0x7f, 0x8, 0x3, 0x5, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r1, r2, r3, 0x1, 0x1, 0x1]}, 0x80) 07:58:04 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)='F', 0x1, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:04 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x80000407, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = socket(0x22, 0x2, 0x2) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbfb, {0x1, 0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), r1) socket(0x1f, 0x5, 0x82) [ 277.337177][ T9892] loop1: detected capacity change from 0 to 34721 [ 277.375543][ T9901] loop4: detected capacity change from 0 to 34721 07:58:04 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0), 0x0, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:04 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x8, 0xfffffe01, 0x80000001, 0x3, 0x988, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x4}, 0x48) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x10, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @jmp={0x5, 0x1, 0x0, 0xa, 0x6, 0x30, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x2}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffa}, @generic={0x7f, 0x8, 0x3, 0x5, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r1, r2, r3, 0x1, 0x1, 0x1]}, 0x80) 07:58:04 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x80000407, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = socket(0x22, 0x2, 0x2) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbfb, {0x1, 0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), r1) 07:58:04 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0), 0x0, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:04 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x8, 0xfffffe01, 0x80000001, 0x3, 0x988, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x4}, 0x48) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x10, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @jmp={0x5, 0x1, 0x0, 0xa, 0x6, 0x30, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x2}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffa}, @generic={0x7f, 0x8, 0x3, 0x5, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r1, r2, r3, 0x1, 0x1, 0x1]}, 0x80) 07:58:04 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0), 0x0, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:05 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x80000407, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = socket(0x22, 0x2, 0x2) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbfb, {0x1, 0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) 07:58:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x8, 0xfffffe01, 0x80000001, 0x3, 0x988, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x4}, 0x48) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x10, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @jmp={0x5, 0x1, 0x0, 0xa, 0x6, 0x30, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x2}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffa}, @generic={0x7f, 0x8, 0x3, 0x5, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r1, r2, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) [ 277.392678][ T9903] loop5: detected capacity change from 0 to 34721 [ 277.430101][ T9909] loop1: detected capacity change from 0 to 34721 07:58:05 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4af", 0x3e}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:05 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x80000407, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = socket(0x22, 0x2, 0x2) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbfb, {0x1, 0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) socket$nl_generic(0x10, 0x3, 0x10) 07:58:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x8, 0xfffffe01, 0x80000001, 0x3, 0x988, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x4}, 0x48) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x10, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @jmp={0x5, 0x1, 0x0, 0xa, 0x6, 0x30, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x2}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffa}, @generic={0x7f, 0x8, 0x3, 0x5, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r1, r2, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:05 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)='F', 0x1}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:05 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0), 0x0, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:05 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x80000407, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = socket(0x22, 0x2, 0x2) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbfb, {0x1, 0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4c814}, 0x24008000) 07:58:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x8, 0xfffffe01, 0x80000001, 0x3, 0x988, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x10, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @jmp={0x5, 0x1, 0x0, 0xa, 0x6, 0x30, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x2}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffa}, @generic={0x7f, 0x8, 0x3, 0x5, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:05 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x80000407, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket(0x22, 0x2, 0x2) 07:58:05 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0), 0x0, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x10, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @jmp={0x5, 0x1, 0x0, 0xa, 0x6, 0x30, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x2}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffa}, @generic={0x7f, 0x8, 0x3, 0x5, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:05 executing program 0: socket(0x22, 0x2, 0x2) [ 277.479320][ T9919] loop5: detected capacity change from 0 to 34721 [ 277.506073][ T9925] loop4: detected capacity change from 0 to 34721 [ 277.519300][ T9927] loop1: detected capacity change from 0 to 34721 07:58:05 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)='F', 0x1}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x0, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x10, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @jmp={0x5, 0x1, 0x0, 0xa, 0x6, 0x30, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x2}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffa}, @generic={0x7f, 0x8, 0x3, 0x5, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:05 executing program 0: socket(0x0, 0x2, 0x2) 07:58:05 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4af", 0x3e}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x10, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @jmp={0x5, 0x1, 0x0, 0xa, 0x6, 0x30, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x2}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffa}, @generic={0x7f, 0x8, 0x3, 0x5, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) [ 277.566064][ T9940] loop5: detected capacity change from 0 to 34721 07:58:05 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0), 0x0, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:05 executing program 0: socket(0x0, 0x2, 0x2) 07:58:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x10, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @jmp={0x5, 0x1, 0x0, 0xa, 0x6, 0x30, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x2}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffa}, @generic={0x7f, 0x8, 0x3, 0x5, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:05 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0), 0x0, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:05 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4af", 0x3e}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 277.627214][ T9952] loop4: detected capacity change from 0 to 34721 [ 277.651904][ T9954] loop1: detected capacity change from 0 to 34721 07:58:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 07:58:05 executing program 0: socket(0x0, 0x2, 0x2) 07:58:05 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)='F', 0x1}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x0, 0x0) 07:58:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 07:58:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 07:58:05 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd381439e4412597689aa1cc2c8e8eeb95548e5bfc633344a9c07b7653360af", 0x5d}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:05 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)='F', 0x1}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 277.682462][ T9961] loop5: detected capacity change from 0 to 34721 07:58:05 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9", 0x39, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:05 executing program 0: socket(0x22, 0x0, 0x2) 07:58:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x10, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @jmp={0x5, 0x1, 0x0, 0xa, 0x6, 0x30, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x2}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffa}, @generic={0x7f, 0x8, 0x3, 0x5, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:05 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x8, 0xfffffe01, 0x80000001, 0x3, 0x988, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x4}, 0x48) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x10, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @jmp={0x5, 0x1, 0x0, 0xa, 0x6, 0x30, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x2}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffa}, @generic={0x7f, 0x8, 0x3, 0x5, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r1, r2, r3, 0x1, 0x1, 0x1]}, 0x80) 07:58:05 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)='F', 0x1}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x0, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:05 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b5ea6169ff5addb41a0178b908aaa67975c97180b9e6f52c895084be4afd3", 0x3f}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:05 executing program 0: socket(0x22, 0x0, 0x2) [ 277.752025][ T9974] loop1: detected capacity change from 0 to 34721 [ 277.772977][ T9976] loop5: detected capacity change from 0 to 34721 [ 277.778727][ T9980] loop4: detected capacity change from 0 to 34721 07:58:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x10, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @jmp={0x5, 0x1, 0x0, 0xa, 0x6, 0x30, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x2}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffa}, @generic={0x7f, 0x8, 0x3, 0x5, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:05 executing program 0: socket(0x22, 0x0, 0x2) 07:58:05 executing program 0: socket(0x22, 0x2, 0x0) 07:58:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x10, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @jmp={0x5, 0x1, 0x0, 0xa, 0x6, 0x30, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x2}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffa}, @generic={0x7f, 0x8, 0x3, 0x5, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:05 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7191e0763a05d652afbfce3c8c57f4476c844ea1165c341d29bb2340e8aafbf1135f124a7a1d9242ab2616b05ec3b411e6a5573dd92f0006573746b1917e318ed07c768fe42c3cf24e3984d240800000010b8038ce4e1d9f1fec6fc0098ed0000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="01002bbd7000fedbdf250800000006001b004e2100000500220001000000"], 0x24}, 0x1, 0x0, 0x0, 0x2001}, 0x40051) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40000080}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, 0x464, 0x400, 0x70bd2a, 0x25dfdbfe, "d8e7180fc056b6a5cca635d4b06329adae77895ab1a43da2f54b4186cb2805a143fcb01635934c6b0c56d927142ad30c0696fdaafed45d018392477b5cf8e2642463cf1980d8a73c5053e8ab875776e0250e92248a3df729084a351f89c7e078fba0dbd363c050bacc2ee9d62b7fa6401ffbceacbffd37b052eb037458257589b8aea008b483f155a1613b006455fa4decba78aa0b2fca143001da17dce7118a35ea1a7465f06cc2b35290c09b6b20db1946ab29ebbdf731", ["", "", "", ""]}, 0xc8}, 0x1, 0x0, 0x0, 0x40}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00'], 0x14}}, 0x0) sendmsg$AUDIT_SET(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x3c, 0x3e9, 0x8, 0x70bd26, 0x25dfdbff, {0x54, 0x1, 0x2, 0x0, 0x9, 0x8, 0x6, 0x4, 0x0, 0x1, 0x1}, ["", "", "", "", "", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000001) r2 = fsmount(0xffffffffffffffff, 0x0, 0x78) r3 = syz_genetlink_get_family_id$devlink(&(0x7f00000007c0), r2) syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), r1) syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0), r1) r4 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r4) r5 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r5) r6 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r6) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)=ANY=[@ANYRES16=r6, @ANYRESOCT=r3], 0x34}, 0x1, 0x0, 0x0, 0x55}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) keyctl$reject(0x13, 0x0, 0x100, 0x8000, r5) [ 277.842078][ T9988] loop5: detected capacity change from 0 to 34721 [ 277.867012][ T9997] loop4: detected capacity change from 0 to 34721 07:58:05 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)='F', 0x1, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:05 executing program 0: socket(0x22, 0x2, 0x0) 07:58:05 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)='F', 0x1}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x0, 0x0) 07:58:05 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7191e0763a05d652afbfce3c8c57f4476c844ea1165c341d29bb2340e8aafbf1135f124a7a1d9242ab2616b05ec3b411e6a5573dd92f0006573746b1917e318ed07c768fe42c3cf24e3984d240800000010b8038ce4e1d9f1fec6fc0098ed0000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="01002bbd7000fedbdf250800000006001b004e2100000500220001000000"], 0x24}, 0x1, 0x0, 0x0, 0x2001}, 0x40051) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40000080}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, 0x464, 0x400, 0x70bd2a, 0x25dfdbfe, "d8e7180fc056b6a5cca635d4b06329adae77895ab1a43da2f54b4186cb2805a143fcb01635934c6b0c56d927142ad30c0696fdaafed45d018392477b5cf8e2642463cf1980d8a73c5053e8ab875776e0250e92248a3df729084a351f89c7e078fba0dbd363c050bacc2ee9d62b7fa6401ffbceacbffd37b052eb037458257589b8aea008b483f155a1613b006455fa4decba78aa0b2fca143001da17dce7118a35ea1a7465f06cc2b35290c09b6b20db1946ab29ebbdf731", ["", "", "", ""]}, 0xc8}, 0x1, 0x0, 0x0, 0x40}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00'], 0x14}}, 0x0) sendmsg$AUDIT_SET(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x3c, 0x3e9, 0x8, 0x70bd26, 0x25dfdbff, {0x54, 0x1, 0x2, 0x0, 0x9, 0x8, 0x6, 0x4, 0x0, 0x1, 0x1}, ["", "", "", "", "", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000001) r2 = fsmount(0xffffffffffffffff, 0x0, 0x78) r3 = syz_genetlink_get_family_id$devlink(&(0x7f00000007c0), r2) syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), r1) syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0), r1) r4 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r4) r5 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r5) r6 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r6) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)=ANY=[@ANYRES16=r6, @ANYRESOCT=r3], 0x34}, 0x1, 0x0, 0x0, 0x55}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) keyctl$reject(0x13, 0x0, 0x100, 0x8000, r5) 07:58:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:05 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4db11fd0c949282df5e2ac4792d862e9bcfdedb8502b7b2f8b74435ff3ad1b", 0x21}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:05 executing program 0: socket(0x22, 0x2, 0x0) 07:58:05 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7191e0763a05d652afbfce3c8c57f4476c844ea1165c341d29bb2340e8aafbf1135f124a7a1d9242ab2616b05ec3b411e6a5573dd92f0006573746b1917e318ed07c768fe42c3cf24e3984d240800000010b8038ce4e1d9f1fec6fc0098ed0000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="01002bbd7000fedbdf250800000006001b004e2100000500220001000000"], 0x24}, 0x1, 0x0, 0x0, 0x2001}, 0x40051) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40000080}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, 0x464, 0x400, 0x70bd2a, 0x25dfdbfe, "d8e7180fc056b6a5cca635d4b06329adae77895ab1a43da2f54b4186cb2805a143fcb01635934c6b0c56d927142ad30c0696fdaafed45d018392477b5cf8e2642463cf1980d8a73c5053e8ab875776e0250e92248a3df729084a351f89c7e078fba0dbd363c050bacc2ee9d62b7fa6401ffbceacbffd37b052eb037458257589b8aea008b483f155a1613b006455fa4decba78aa0b2fca143001da17dce7118a35ea1a7465f06cc2b35290c09b6b20db1946ab29ebbdf731", ["", "", "", ""]}, 0xc8}, 0x1, 0x0, 0x0, 0x40}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00'], 0x14}}, 0x0) sendmsg$AUDIT_SET(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x3c, 0x3e9, 0x8, 0x70bd26, 0x25dfdbff, {0x54, 0x1, 0x2, 0x0, 0x9, 0x8, 0x6, 0x4, 0x0, 0x1, 0x1}, ["", "", "", "", "", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000001) r2 = fsmount(0xffffffffffffffff, 0x0, 0x78) r3 = syz_genetlink_get_family_id$devlink(&(0x7f00000007c0), r2) syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), r1) syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0), r1) r4 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r4) r5 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r5) r6 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r6) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)=ANY=[@ANYRES16=r6, @ANYRESOCT=r3], 0x34}, 0x1, 0x0, 0x0, 0x55}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) keyctl$reject(0x13, 0x0, 0x100, 0x8000, r5) 07:58:05 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)='F', 0x1, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:05 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) socket(0x1f, 0x1, 0x4) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, 0x0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000180)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000200)=ANY=[@ANYBLOB="950000000000000018270000", @ANYRES32=r0, @ANYBLOB="000000000100000074f60000010800"/32], &(0x7f0000000040)='syzkaller\x00', 0x8, 0x4, &(0x7f0000000080)=""/4, 0x40f00, 0x18, '\x00', 0x0, 0x1b, r2, 0x8, &(0x7f00000000c0)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x3, 0x10, 0x1, 0xb3b}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)=[r3, r4, r5, 0x1]}, 0x80) 07:58:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:05 executing program 5: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000040)) mount_setattr(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x9000, &(0x7f0000000080)={0x7d, 0x70, 0x20000, {r0}}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=ANY=[@ANYBLOB="090000000000000018100000", @ANYRES32, @ANYBLOB="000011040000000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 277.935998][T10010] loop5: detected capacity change from 0 to 34721 07:58:05 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7191e0763a05d652afbfce3c8c57f4476c844ea1165c341d29bb2340e8aafbf1135f124a7a1d9242ab2616b05ec3b411e6a5573dd92f0006573746b1917e318ed07c768fe42c3cf24e3984d240800000010b8038ce4e1d9f1fec6fc0098ed0000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="01002bbd7000fedbdf250800000006001b004e2100000500220001000000"], 0x24}, 0x1, 0x0, 0x0, 0x2001}, 0x40051) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40000080}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, 0x464, 0x400, 0x70bd2a, 0x25dfdbfe, "d8e7180fc056b6a5cca635d4b06329adae77895ab1a43da2f54b4186cb2805a143fcb01635934c6b0c56d927142ad30c0696fdaafed45d018392477b5cf8e2642463cf1980d8a73c5053e8ab875776e0250e92248a3df729084a351f89c7e078fba0dbd363c050bacc2ee9d62b7fa6401ffbceacbffd37b052eb037458257589b8aea008b483f155a1613b006455fa4decba78aa0b2fca143001da17dce7118a35ea1a7465f06cc2b35290c09b6b20db1946ab29ebbdf731", ["", "", "", ""]}, 0xc8}, 0x1, 0x0, 0x0, 0x40}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00'], 0x14}}, 0x0) sendmsg$AUDIT_SET(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x3c, 0x3e9, 0x8, 0x70bd26, 0x25dfdbff, {0x54, 0x1, 0x2, 0x0, 0x9, 0x8, 0x6, 0x4, 0x0, 0x1, 0x1}, ["", "", "", "", "", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000001) r2 = fsmount(0xffffffffffffffff, 0x0, 0x78) r3 = syz_genetlink_get_family_id$devlink(&(0x7f00000007c0), r2) syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), r1) syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0), r1) r4 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r4) r5 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r5) r6 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r6) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)=ANY=[@ANYRES16=r6, @ANYRESOCT=r3], 0x34}, 0x1, 0x0, 0x0, 0x55}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 07:58:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x10, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @jmp={0x5, 0x1, 0x0, 0xa, 0x6, 0x30, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x2}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffa}, @generic={0x7f, 0x8, 0x3, 0x5, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:05 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e4d", 0x3}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x10, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @jmp={0x5, 0x1, 0x0, 0xa, 0x6, 0x30, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x2}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffa}, @generic={0x7f, 0x8, 0x3, 0x5, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:05 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) socket(0x1f, 0x1, 0x4) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, 0x0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000180)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000200)=ANY=[@ANYBLOB="950000000000000018270000", @ANYRES32=r0, @ANYBLOB="000000000100000074f60000010800"/32], &(0x7f0000000040)='syzkaller\x00', 0x8, 0x4, &(0x7f0000000080)=""/4, 0x40f00, 0x18, '\x00', 0x0, 0x1b, r2, 0x8, &(0x7f00000000c0)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x3, 0x10, 0x1, 0xb3b}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)=[r3, r4, r5, 0x1]}, 0x80) 07:58:05 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7191e0763a05d652afbfce3c8c57f4476c844ea1165c341d29bb2340e8aafbf1135f124a7a1d9242ab2616b05ec3b411e6a5573dd92f0006573746b1917e318ed07c768fe42c3cf24e3984d240800000010b8038ce4e1d9f1fec6fc0098ed0000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="01002bbd7000fedbdf250800000006001b004e2100000500220001000000"], 0x24}, 0x1, 0x0, 0x0, 0x2001}, 0x40051) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40000080}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, 0x464, 0x400, 0x70bd2a, 0x25dfdbfe, "d8e7180fc056b6a5cca635d4b06329adae77895ab1a43da2f54b4186cb2805a143fcb01635934c6b0c56d927142ad30c0696fdaafed45d018392477b5cf8e2642463cf1980d8a73c5053e8ab875776e0250e92248a3df729084a351f89c7e078fba0dbd363c050bacc2ee9d62b7fa6401ffbceacbffd37b052eb037458257589b8aea008b483f155a1613b006455fa4decba78aa0b2fca143001da17dce7118a35ea1a7465f06cc2b35290c09b6b20db1946ab29ebbdf731", ["", "", "", ""]}, 0xc8}, 0x1, 0x0, 0x0, 0x40}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00'], 0x14}}, 0x0) sendmsg$AUDIT_SET(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x3c, 0x3e9, 0x8, 0x70bd26, 0x25dfdbff, {0x54, 0x1, 0x2, 0x0, 0x9, 0x8, 0x6, 0x4, 0x0, 0x1, 0x1}, ["", "", "", "", "", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000001) r2 = fsmount(0xffffffffffffffff, 0x0, 0x78) r3 = syz_genetlink_get_family_id$devlink(&(0x7f00000007c0), r2) syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), r1) syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0), r1) r4 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r4) r5 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r5) r6 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r6) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)=ANY=[@ANYRES16=r6, @ANYRESOCT=r3], 0x34}, 0x1, 0x0, 0x0, 0x55}, 0x0) [ 277.996571][T10024] loop4: detected capacity change from 0 to 34721 07:58:05 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)='F', 0x1, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:05 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) socket(0x1f, 0x1, 0x4) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, 0x0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000180)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000200)=ANY=[@ANYBLOB="950000000000000018270000", @ANYRES32=r0, @ANYBLOB="000000000100000074f60000010800"/32], &(0x7f0000000040)='syzkaller\x00', 0x8, 0x4, &(0x7f0000000080)=""/4, 0x40f00, 0x18, '\x00', 0x0, 0x1b, r2, 0x8, &(0x7f00000000c0)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x3, 0x10, 0x1, 0xb3b}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)=[r3, r4, r5, 0x1]}, 0x80) 07:58:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0xf, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @jmp={0x5, 0x1, 0x0, 0xa, 0x6, 0x30, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x2}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffa}, @generic={0x7f, 0x8, 0x3, 0x5, 0x5}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:05 executing program 5: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000040)) mount_setattr(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x9000, &(0x7f0000000080)={0x7d, 0x70, 0x20000, {r0}}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=ANY=[@ANYBLOB="090000000000000018100000", @ANYRES32, @ANYBLOB="000011040000000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:58:05 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socket(0x1f, 0x1, 0x4) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, 0x0) 07:58:05 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7191e0763a05d652afbfce3c8c57f4476c844ea1165c341d29bb2340e8aafbf1135f124a7a1d9242ab2616b05ec3b411e6a5573dd92f0006573746b1917e318ed07c768fe42c3cf24e3984d240800000010b8038ce4e1d9f1fec6fc0098ed0000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="01002bbd7000fedbdf250800000006001b004e2100000500220001000000"], 0x24}, 0x1, 0x0, 0x0, 0x2001}, 0x40051) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40000080}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, 0x464, 0x400, 0x70bd2a, 0x25dfdbfe, "d8e7180fc056b6a5cca635d4b06329adae77895ab1a43da2f54b4186cb2805a143fcb01635934c6b0c56d927142ad30c0696fdaafed45d018392477b5cf8e2642463cf1980d8a73c5053e8ab875776e0250e92248a3df729084a351f89c7e078fba0dbd363c050bacc2ee9d62b7fa6401ffbceacbffd37b052eb037458257589b8aea008b483f155a1613b006455fa4decba78aa0b2fca143001da17dce7118a35ea1a7465f06cc2b35290c09b6b20db1946ab29ebbdf731", ["", "", "", ""]}, 0xc8}, 0x1, 0x0, 0x0, 0x40}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00'], 0x14}}, 0x0) sendmsg$AUDIT_SET(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x3c, 0x3e9, 0x8, 0x70bd26, 0x25dfdbff, {0x54, 0x1, 0x2, 0x0, 0x9, 0x8, 0x6, 0x4, 0x0, 0x1, 0x1}, ["", "", "", "", "", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000001) r2 = fsmount(0xffffffffffffffff, 0x0, 0x78) syz_genetlink_get_family_id$devlink(&(0x7f00000007c0), r2) syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), r1) syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0), r1) r3 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r3) r4 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r4) r5 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r5) 07:58:05 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:05 executing program 5: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000040)) mount_setattr(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x9000, &(0x7f0000000080)={0x7d, 0x70, 0x20000, {r0}}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=ANY=[@ANYBLOB="090000000000000018100000", @ANYRES32, @ANYBLOB="000011040000000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:58:05 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7191e0763a05d652afbfce3c8c57f4476c844ea1165c341d29bb2340e8aafbf1135f124a7a1d9242ab2616b05ec3b411e6a5573dd92f0006573746b1917e318ed07c768fe42c3cf24e3984d240800000010b8038ce4e1d9f1fec6fc0098ed0000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="01002bbd7000fedbdf250800000006001b004e2100000500220001000000"], 0x24}, 0x1, 0x0, 0x0, 0x2001}, 0x40051) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40000080}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, 0x464, 0x400, 0x70bd2a, 0x25dfdbfe, "d8e7180fc056b6a5cca635d4b06329adae77895ab1a43da2f54b4186cb2805a143fcb01635934c6b0c56d927142ad30c0696fdaafed45d018392477b5cf8e2642463cf1980d8a73c5053e8ab875776e0250e92248a3df729084a351f89c7e078fba0dbd363c050bacc2ee9d62b7fa6401ffbceacbffd37b052eb037458257589b8aea008b483f155a1613b006455fa4decba78aa0b2fca143001da17dce7118a35ea1a7465f06cc2b35290c09b6b20db1946ab29ebbdf731", ["", "", "", ""]}, 0xc8}, 0x1, 0x0, 0x0, 0x40}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00'], 0x14}}, 0x0) sendmsg$AUDIT_SET(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x3c, 0x3e9, 0x8, 0x70bd26, 0x25dfdbff, {0x54, 0x1, 0x2, 0x0, 0x9, 0x8, 0x6, 0x4, 0x0, 0x1, 0x1}, ["", "", "", "", "", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000001) r2 = fsmount(0xffffffffffffffff, 0x0, 0x78) syz_genetlink_get_family_id$devlink(&(0x7f00000007c0), r2) syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), r1) syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0), r1) r3 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r3) r4 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r4) add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 07:58:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0xe, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @jmp={0x5, 0x1, 0x0, 0xa, 0x6, 0x30, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x2}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:05 executing program 5: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000040)) mount_setattr(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x9000, &(0x7f0000000080)={0x7d, 0x70, 0x20000, {r0}}, 0x20) 07:58:05 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socket(0x1f, 0x1, 0x4) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) [ 278.164731][T10064] loop4: detected capacity change from 0 to 34721 07:58:05 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084ee", 0x1d, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:05 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7191e0763a05d652afbfce3c8c57f4476c844ea1165c341d29bb2340e8aafbf1135f124a7a1d9242ab2616b05ec3b411e6a5573dd92f0006573746b1917e318ed07c768fe42c3cf24e3984d240800000010b8038ce4e1d9f1fec6fc0098ed0000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="01002bbd7000fedbdf250800000006001b004e2100000500220001000000"], 0x24}, 0x1, 0x0, 0x0, 0x2001}, 0x40051) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40000080}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, 0x464, 0x400, 0x70bd2a, 0x25dfdbfe, "d8e7180fc056b6a5cca635d4b06329adae77895ab1a43da2f54b4186cb2805a143fcb01635934c6b0c56d927142ad30c0696fdaafed45d018392477b5cf8e2642463cf1980d8a73c5053e8ab875776e0250e92248a3df729084a351f89c7e078fba0dbd363c050bacc2ee9d62b7fa6401ffbceacbffd37b052eb037458257589b8aea008b483f155a1613b006455fa4decba78aa0b2fca143001da17dce7118a35ea1a7465f06cc2b35290c09b6b20db1946ab29ebbdf731", ["", "", "", ""]}, 0xc8}, 0x1, 0x0, 0x0, 0x40}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00'], 0x14}}, 0x0) sendmsg$AUDIT_SET(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x3c, 0x3e9, 0x8, 0x70bd26, 0x25dfdbff, {0x54, 0x1, 0x2, 0x0, 0x9, 0x8, 0x6, 0x4, 0x0, 0x1, 0x1}, ["", "", "", "", "", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000001) r2 = fsmount(0xffffffffffffffff, 0x0, 0x78) syz_genetlink_get_family_id$devlink(&(0x7f00000007c0), r2) syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), r1) syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0), r1) r3 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r3) r4 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r4) 07:58:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0xc, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @jmp={0x5, 0x1, 0x0, 0xa, 0x6, 0x30, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x2}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:05 executing program 5: mount_setattr(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x9000, &(0x7f0000000080)={0x7d, 0x70, 0x20000}, 0x20) 07:58:05 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socket(0x1f, 0x1, 0x4) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) 07:58:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0xc, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @jmp={0x5, 0x1, 0x0, 0xa, 0x6, 0x30, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x2}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:05 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:05 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socket(0x1f, 0x1, 0x4) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) 07:58:05 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7191e0763a05d652afbfce3c8c57f4476c844ea1165c341d29bb2340e8aafbf1135f124a7a1d9242ab2616b05ec3b411e6a5573dd92f0006573746b1917e318ed07c768fe42c3cf24e3984d240800000010b8038ce4e1d9f1fec6fc0098ed0000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="01002bbd7000fedbdf250800000006001b004e2100000500220001000000"], 0x24}, 0x1, 0x0, 0x0, 0x2001}, 0x40051) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40000080}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, 0x464, 0x400, 0x70bd2a, 0x25dfdbfe, "d8e7180fc056b6a5cca635d4b06329adae77895ab1a43da2f54b4186cb2805a143fcb01635934c6b0c56d927142ad30c0696fdaafed45d018392477b5cf8e2642463cf1980d8a73c5053e8ab875776e0250e92248a3df729084a351f89c7e078fba0dbd363c050bacc2ee9d62b7fa6401ffbceacbffd37b052eb037458257589b8aea008b483f155a1613b006455fa4decba78aa0b2fca143001da17dce7118a35ea1a7465f06cc2b35290c09b6b20db1946ab29ebbdf731", ["", "", "", ""]}, 0xc8}, 0x1, 0x0, 0x0, 0x40}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00'], 0x14}}, 0x0) sendmsg$AUDIT_SET(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x3c, 0x3e9, 0x8, 0x70bd26, 0x25dfdbff, {0x54, 0x1, 0x2, 0x0, 0x9, 0x8, 0x6, 0x4, 0x0, 0x1, 0x1}, ["", "", "", "", "", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000001) r2 = fsmount(0xffffffffffffffff, 0x0, 0x78) syz_genetlink_get_family_id$devlink(&(0x7f00000007c0), r2) syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), r1) syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0), r1) r3 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r3) add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 07:58:05 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x9000, &(0x7f0000000080)={0x7d, 0x70, 0x20000}, 0x20) 07:58:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0xc, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @jmp={0x5, 0x1, 0x0, 0xa, 0x6, 0x30, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x2}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:05 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x7d, 0x70, 0x20000}, 0x20) 07:58:05 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084ee", 0x1d, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:05 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7191e0763a05d652afbfce3c8c57f4476c844ea1165c341d29bb2340e8aafbf1135f124a7a1d9242ab2616b05ec3b411e6a5573dd92f0006573746b1917e318ed07c768fe42c3cf24e3984d240800000010b8038ce4e1d9f1fec6fc0098ed0000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="01002bbd7000fedbdf250800000006001b004e2100000500220001000000"], 0x24}, 0x1, 0x0, 0x0, 0x2001}, 0x40051) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40000080}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, 0x464, 0x400, 0x70bd2a, 0x25dfdbfe, "d8e7180fc056b6a5cca635d4b06329adae77895ab1a43da2f54b4186cb2805a143fcb01635934c6b0c56d927142ad30c0696fdaafed45d018392477b5cf8e2642463cf1980d8a73c5053e8ab875776e0250e92248a3df729084a351f89c7e078fba0dbd363c050bacc2ee9d62b7fa6401ffbceacbffd37b052eb037458257589b8aea008b483f155a1613b006455fa4decba78aa0b2fca143001da17dce7118a35ea1a7465f06cc2b35290c09b6b20db1946ab29ebbdf731", ["", "", "", ""]}, 0xc8}, 0x1, 0x0, 0x0, 0x40}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00'], 0x14}}, 0x0) sendmsg$AUDIT_SET(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x3c, 0x3e9, 0x8, 0x70bd26, 0x25dfdbff, {0x54, 0x1, 0x2, 0x0, 0x9, 0x8, 0x6, 0x4, 0x0, 0x1, 0x1}, ["", "", "", "", "", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000001) r2 = fsmount(0xffffffffffffffff, 0x0, 0x78) syz_genetlink_get_family_id$devlink(&(0x7f00000007c0), r2) syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), r1) syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0), r1) r3 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r3) 07:58:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0xe, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @jmp={0x5, 0x1, 0x0, 0xa, 0x6, 0x30, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x2}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:05 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socket(0x1f, 0x1, 0x4) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) 07:58:05 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 278.277357][T10078] loop4: detected capacity change from 0 to 34721 07:58:05 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:05 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7191e0763a05d652afbfce3c8c57f4476c844ea1165c341d29bb2340e8aafbf1135f124a7a1d9242ab2616b05ec3b411e6a5573dd92f0006573746b1917e318ed07c768fe42c3cf24e3984d240800000010b8038ce4e1d9f1fec6fc0098ed0000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="01002bbd7000fedbdf250800000006001b004e2100000500220001000000"], 0x24}, 0x1, 0x0, 0x0, 0x2001}, 0x40051) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40000080}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, 0x464, 0x400, 0x70bd2a, 0x25dfdbfe, "d8e7180fc056b6a5cca635d4b06329adae77895ab1a43da2f54b4186cb2805a143fcb01635934c6b0c56d927142ad30c0696fdaafed45d018392477b5cf8e2642463cf1980d8a73c5053e8ab875776e0250e92248a3df729084a351f89c7e078fba0dbd363c050bacc2ee9d62b7fa6401ffbceacbffd37b052eb037458257589b8aea008b483f155a1613b006455fa4decba78aa0b2fca143001da17dce7118a35ea1a7465f06cc2b35290c09b6b20db1946ab29ebbdf731", ["", "", "", ""]}, 0xc8}, 0x1, 0x0, 0x0, 0x40}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00'], 0x14}}, 0x0) sendmsg$AUDIT_SET(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x3c, 0x3e9, 0x8, 0x70bd26, 0x25dfdbff, {0x54, 0x1, 0x2, 0x0, 0x9, 0x8, 0x6, 0x4, 0x0, 0x1, 0x1}, ["", "", "", "", "", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000001) r2 = fsmount(0xffffffffffffffff, 0x0, 0x78) syz_genetlink_get_family_id$devlink(&(0x7f00000007c0), r2) syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), r1) syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0), r1) add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 07:58:05 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socket(0x1f, 0x1, 0x4) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) 07:58:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0xe, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @jmp={0x5, 0x1, 0x0, 0xa, 0x6, 0x30, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x2}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:05 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socket(0x1f, 0x1, 0x4) 07:58:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0xe, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @jmp={0x5, 0x1, 0x0, 0xa, 0x6, 0x30, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x2}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:05 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 278.393088][T10109] loop4: detected capacity change from 0 to 34721 07:58:06 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084ee", 0x1d, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0xe, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @jmp={0x5, 0x1, 0x0, 0xa, 0x6, 0x30, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x2}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:06 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7191e0763a05d652afbfce3c8c57f4476c844ea1165c341d29bb2340e8aafbf1135f124a7a1d9242ab2616b05ec3b411e6a5573dd92f0006573746b1917e318ed07c768fe42c3cf24e3984d240800000010b8038ce4e1d9f1fec6fc0098ed0000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="01002bbd7000fedbdf250800000006001b004e2100000500220001000000"], 0x24}, 0x1, 0x0, 0x0, 0x2001}, 0x40051) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40000080}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, 0x464, 0x400, 0x70bd2a, 0x25dfdbfe, "d8e7180fc056b6a5cca635d4b06329adae77895ab1a43da2f54b4186cb2805a143fcb01635934c6b0c56d927142ad30c0696fdaafed45d018392477b5cf8e2642463cf1980d8a73c5053e8ab875776e0250e92248a3df729084a351f89c7e078fba0dbd363c050bacc2ee9d62b7fa6401ffbceacbffd37b052eb037458257589b8aea008b483f155a1613b006455fa4decba78aa0b2fca143001da17dce7118a35ea1a7465f06cc2b35290c09b6b20db1946ab29ebbdf731", ["", "", "", ""]}, 0xc8}, 0x1, 0x0, 0x0, 0x40}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00'], 0x14}}, 0x0) sendmsg$AUDIT_SET(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x3c, 0x3e9, 0x8, 0x70bd26, 0x25dfdbff, {0x54, 0x1, 0x2, 0x0, 0x9, 0x8, 0x6, 0x4, 0x0, 0x1, 0x1}, ["", "", "", "", "", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000001) r2 = fsmount(0xffffffffffffffff, 0x0, 0x78) syz_genetlink_get_family_id$devlink(&(0x7f00000007c0), r2) syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), r1) syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0), r1) 07:58:06 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 07:58:06 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) 07:58:06 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f99e", 0x2}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:06 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x70, 0x20000}, 0x20) 07:58:06 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) 07:58:06 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7191e0763a05d652afbfce3c8c57f4476c844ea1165c341d29bb2340e8aafbf1135f124a7a1d9242ab2616b05ec3b411e6a5573dd92f0006573746b1917e318ed07c768fe42c3cf24e3984d240800000010b8038ce4e1d9f1fec6fc0098ed0000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="01002bbd7000fedbdf250800000006001b004e2100000500220001000000"], 0x24}, 0x1, 0x0, 0x0, 0x2001}, 0x40051) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40000080}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, 0x464, 0x400, 0x70bd2a, 0x25dfdbfe, "d8e7180fc056b6a5cca635d4b06329adae77895ab1a43da2f54b4186cb2805a143fcb01635934c6b0c56d927142ad30c0696fdaafed45d018392477b5cf8e2642463cf1980d8a73c5053e8ab875776e0250e92248a3df729084a351f89c7e078fba0dbd363c050bacc2ee9d62b7fa6401ffbceacbffd37b052eb037458257589b8aea008b483f155a1613b006455fa4decba78aa0b2fca143001da17dce7118a35ea1a7465f06cc2b35290c09b6b20db1946ab29ebbdf731", ["", "", "", ""]}, 0xc8}, 0x1, 0x0, 0x0, 0x40}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00'], 0x14}}, 0x0) sendmsg$AUDIT_SET(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x3c, 0x3e9, 0x8, 0x70bd26, 0x25dfdbff, {0x54, 0x1, 0x2, 0x0, 0x9, 0x8, 0x6, 0x4, 0x0, 0x1, 0x1}, ["", "", "", "", "", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000001) r2 = fsmount(0xffffffffffffffff, 0x0, 0x78) syz_genetlink_get_family_id$devlink(&(0x7f00000007c0), r2) syz_genetlink_get_family_id$devlink(&(0x7f00000009c0), r1) 07:58:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0xc, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @jmp={0x5, 0x1, 0x0, 0xa, 0x6, 0x30, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x2}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:06 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x70, 0x20000}, 0x20) 07:58:06 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7191e0763a05d652afbfce3c8c57f4476c844ea1165c341d29bb2340e8aafbf1135f124a7a1d9242ab2616b05ec3b411e6a5573dd92f0006573746b1917e318ed07c768fe42c3cf24e3984d240800000010b8038ce4e1d9f1fec6fc0098ed0000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="01002bbd7000fedbdf250800000006001b004e2100000500220001000000"], 0x24}, 0x1, 0x0, 0x0, 0x2001}, 0x40051) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40000080}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, 0x464, 0x400, 0x70bd2a, 0x25dfdbfe, "d8e7180fc056b6a5cca635d4b06329adae77895ab1a43da2f54b4186cb2805a143fcb01635934c6b0c56d927142ad30c0696fdaafed45d018392477b5cf8e2642463cf1980d8a73c5053e8ab875776e0250e92248a3df729084a351f89c7e078fba0dbd363c050bacc2ee9d62b7fa6401ffbceacbffd37b052eb037458257589b8aea008b483f155a1613b006455fa4decba78aa0b2fca143001da17dce7118a35ea1a7465f06cc2b35290c09b6b20db1946ab29ebbdf731", ["", "", "", ""]}, 0xc8}, 0x1, 0x0, 0x0, 0x40}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00'], 0x14}}, 0x0) sendmsg$AUDIT_SET(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x3c, 0x3e9, 0x8, 0x70bd26, 0x25dfdbff, {0x54, 0x1, 0x2, 0x0, 0x9, 0x8, 0x6, 0x4, 0x0, 0x1, 0x1}, ["", "", "", "", "", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000001) r2 = fsmount(0xffffffffffffffff, 0x0, 0x78) syz_genetlink_get_family_id$devlink(&(0x7f00000007c0), r2) 07:58:06 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff0199", 0x2b, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:06 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 07:58:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0xc, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @jmp={0x5, 0x1, 0x0, 0xa, 0x6, 0x30, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x2}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:06 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x70, 0x20000}, 0x20) 07:58:06 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7191e0763a05d652afbfce3c8c57f4476c844ea1165c341d29bb2340e8aafbf1135f124a7a1d9242ab2616b05ec3b411e6a5573dd92f0006573746b1917e318ed07c768fe42c3cf24e3984d240800000010b8038ce4e1d9f1fec6fc0098ed0000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="01002bbd7000fedbdf250800000006001b004e2100000500220001000000"], 0x24}, 0x1, 0x0, 0x0, 0x2001}, 0x40051) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40000080}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, 0x464, 0x400, 0x70bd2a, 0x25dfdbfe, "d8e7180fc056b6a5cca635d4b06329adae77895ab1a43da2f54b4186cb2805a143fcb01635934c6b0c56d927142ad30c0696fdaafed45d018392477b5cf8e2642463cf1980d8a73c5053e8ab875776e0250e92248a3df729084a351f89c7e078fba0dbd363c050bacc2ee9d62b7fa6401ffbceacbffd37b052eb037458257589b8aea008b483f155a1613b006455fa4decba78aa0b2fca143001da17dce7118a35ea1a7465f06cc2b35290c09b6b20db1946ab29ebbdf731", ["", "", "", ""]}, 0xc8}, 0x1, 0x0, 0x0, 0x40}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00'], 0x14}}, 0x0) sendmsg$AUDIT_SET(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x3c, 0x3e9, 0x8, 0x70bd26, 0x25dfdbff, {0x54, 0x1, 0x2, 0x0, 0x9, 0x8, 0x6, 0x4, 0x0, 0x1, 0x1}, ["", "", "", "", "", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000001) fsmount(0xffffffffffffffff, 0x0, 0x78) 07:58:06 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)="f9", 0x1}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 278.536465][T10138] loop4: detected capacity change from 0 to 34721 07:58:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0xc, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @jmp={0x5, 0x1, 0x0, 0xa, 0x6, 0x30, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x2}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:06 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x7d, 0x0, 0x20000}, 0x20) 07:58:06 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7191e0763a05d652afbfce3c8c57f4476c844ea1165c341d29bb2340e8aafbf1135f124a7a1d9242ab2616b05ec3b411e6a5573dd92f0006573746b1917e318ed07c768fe42c3cf24e3984d240800000010b8038ce4e1d9f1fec6fc0098ed0000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="01002bbd7000fedbdf250800000006001b004e2100000500220001000000"], 0x24}, 0x1, 0x0, 0x0, 0x2001}, 0x40051) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40000080}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, 0x464, 0x400, 0x70bd2a, 0x25dfdbfe, "d8e7180fc056b6a5cca635d4b06329adae77895ab1a43da2f54b4186cb2805a143fcb01635934c6b0c56d927142ad30c0696fdaafed45d018392477b5cf8e2642463cf1980d8a73c5053e8ab875776e0250e92248a3df729084a351f89c7e078fba0dbd363c050bacc2ee9d62b7fa6401ffbceacbffd37b052eb037458257589b8aea008b483f155a1613b006455fa4decba78aa0b2fca143001da17dce7118a35ea1a7465f06cc2b35290c09b6b20db1946ab29ebbdf731", ["", "", "", ""]}, 0xc8}, 0x1, 0x0, 0x0, 0x40}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00'], 0x14}}, 0x0) sendmsg$AUDIT_SET(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x3c, 0x3e9, 0x8, 0x70bd26, 0x25dfdbff, {0x54, 0x1, 0x2, 0x0, 0x9, 0x8, 0x6, 0x4, 0x0, 0x1, 0x1}, ["", "", "", "", "", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000001) 07:58:06 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) 07:58:06 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x7d, 0x0, 0x20000}, 0x20) 07:58:06 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) [ 278.617809][T10151] loop4: detected capacity change from 0 to 34721 07:58:06 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff0199", 0x2b, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0xe, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @jmp={0x5, 0x1, 0x0, 0xa, 0x6, 0x30, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x2}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:06 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x7d, 0x0, 0x20000}, 0x20) 07:58:06 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7191e0763a05d652afbfce3c8c57f4476c844ea1165c341d29bb2340e8aafbf1135f124a7a1d9242ab2616b05ec3b411e6a5573dd92f0006573746b1917e318ed07c768fe42c3cf24e3984d240800000010b8038ce4e1d9f1fec6fc0098ed0000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="01002bbd7000fedbdf250800000006001b004e2100000500220001000000"], 0x24}, 0x1, 0x0, 0x0, 0x2001}, 0x40051) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40000080}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, 0x464, 0x400, 0x70bd2a, 0x25dfdbfe, "d8e7180fc056b6a5cca635d4b06329adae77895ab1a43da2f54b4186cb2805a143fcb01635934c6b0c56d927142ad30c0696fdaafed45d018392477b5cf8e2642463cf1980d8a73c5053e8ab875776e0250e92248a3df729084a351f89c7e078fba0dbd363c050bacc2ee9d62b7fa6401ffbceacbffd37b052eb037458257589b8aea008b483f155a1613b006455fa4decba78aa0b2fca143001da17dce7118a35ea1a7465f06cc2b35290c09b6b20db1946ab29ebbdf731", ["", "", "", ""]}, 0xc8}, 0x1, 0x0, 0x0, 0x40}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00'], 0x14}}, 0x0) 07:58:06 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) 07:58:06 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:06 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x7d, 0x70}, 0x20) 07:58:06 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7191e0763a05d652afbfce3c8c57f4476c844ea1165c341d29bb2340e8aafbf1135f124a7a1d9242ab2616b05ec3b411e6a5573dd92f0006573746b1917e318ed07c768fe42c3cf24e3984d240800000010b8038ce4e1d9f1fec6fc0098ed0000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="01002bbd7000fedbdf250800000006001b004e2100000500220001000000"], 0x24}, 0x1, 0x0, 0x0, 0x2001}, 0x40051) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40000080}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, 0x464, 0x400, 0x70bd2a, 0x25dfdbfe, "d8e7180fc056b6a5cca635d4b06329adae77895ab1a43da2f54b4186cb2805a143fcb01635934c6b0c56d927142ad30c0696fdaafed45d018392477b5cf8e2642463cf1980d8a73c5053e8ab875776e0250e92248a3df729084a351f89c7e078fba0dbd363c050bacc2ee9d62b7fa6401ffbceacbffd37b052eb037458257589b8aea008b483f155a1613b006455fa4decba78aa0b2fca143001da17dce7118a35ea1a7465f06cc2b35290c09b6b20db1946ab29ebbdf731", ["", "", "", ""]}, 0xc8}, 0x1, 0x0, 0x0, 0x40}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 07:58:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0xe, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @jmp={0x5, 0x1, 0x0, 0xa, 0x6, 0x30, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x2}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:06 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 07:58:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0xc, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @jmp={0x5, 0x1, 0x0, 0xa, 0x6, 0x30, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x6}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:06 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x70, 0x20000}, 0x20) [ 278.755669][T10185] loop4: detected capacity change from 0 to 34721 07:58:06 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff0199", 0x2b, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:06 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7191e0763a05d652afbfce3c8c57f4476c844ea1165c341d29bb2340e8aafbf1135f124a7a1d9242ab2616b05ec3b411e6a5573dd92f0006573746b1917e318ed07c768fe42c3cf24e3984d240800000010b8038ce4e1d9f1fec6fc0098ed0000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="01002bbd7000fedbdf250800000006001b004e2100000500220001000000"], 0x24}, 0x1, 0x0, 0x0, 0x2001}, 0x40051) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40000080}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, 0x464, 0x400, 0x70bd2a, 0x25dfdbfe, "d8e7180fc056b6a5cca635d4b06329adae77895ab1a43da2f54b4186cb2805a143fcb01635934c6b0c56d927142ad30c0696fdaafed45d018392477b5cf8e2642463cf1980d8a73c5053e8ab875776e0250e92248a3df729084a351f89c7e078fba0dbd363c050bacc2ee9d62b7fa6401ffbceacbffd37b052eb037458257589b8aea008b483f155a1613b006455fa4decba78aa0b2fca143001da17dce7118a35ea1a7465f06cc2b35290c09b6b20db1946ab29ebbdf731", ["", "", "", ""]}, 0xc8}, 0x1, 0x0, 0x0, 0x40}, 0x0) 07:58:06 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 07:58:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0xa, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @jmp={0x5, 0x1, 0x0, 0xa, 0x6, 0x30, 0xffffffffffffffff}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:06 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x70, 0x20000}, 0x20) 07:58:06 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:06 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x70, 0x20000}, 0x20) 07:58:06 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) 07:58:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:06 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7191e0763a05d652afbfce3c8c57f4476c844ea1165c341d29bb2340e8aafbf1135f124a7a1d9242ab2616b05ec3b411e6a5573dd92f0006573746b1917e318ed07c768fe42c3cf24e3984d240800000010b8038ce4e1d9f1fec6fc0098ed0000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="01002bbd7000fedbdf250800000006001b004e2100000500220001000000"], 0x24}, 0x1, 0x0, 0x0, 0x2001}, 0x40051) 07:58:06 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 07:58:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x7, &(0x7f0000000000)=@framed={{}, [@cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:06 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5", 0x32, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:06 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) 07:58:06 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7191e0763a05d652afbfce3c8c57f4476c844ea1165c341d29bb2340e8aafbf1135f124a7a1d9242ab2616b05ec3b411e6a5573dd92f0006573746b1917e318ed07c768fe42c3cf24e3984d240800000010b8038ce4e1d9f1fec6fc0098ed0000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:06 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c7f804c405a75b59aec609d378747939ae49e339e6932b0a7de67d9a6be96be92edff4c2a0ad919696f19c6703282cf988ebfc608777e007673fec902098585882980dd16416ed8c92f95507e47d9c191af35e293e79587b9e0cd0b7657ddbdc61239ad768c7b0032dcad1572435f2beaf8", 0xe2, 0x8}, {&(0x7f00000001c0)}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:06 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 07:58:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x7, &(0x7f0000000000)=@framed={{}, [@cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) [ 278.914207][T10208] loop4: detected capacity change from 0 to 34721 07:58:06 executing program 1: sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7191e0763a05d652afbfce3c8c57f4476c844ea1165c341d29bb2340e8aafbf1135f124a7a1d9242ab2616b05ec3b411e6a5573dd92f0006573746b1917e318ed07c768fe42c3cf24e3984d240800000010b8038ce4e1d9f1fec6fc0098ed0000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:06 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) 07:58:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x7, &(0x7f0000000000)=@framed={{}, [@cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:06 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 07:58:06 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x20000}, 0x20) 07:58:06 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) 07:58:06 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5", 0x32, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:06 executing program 1: sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7191e0763a05d652afbfce3c8c57f4476c844ea1165c341d29bb2340e8aafbf1135f124a7a1d9242ab2616b05ec3b411e6a5573dd92f0006573746b1917e318ed07c768fe42c3cf24e3984d240800000010b8038ce4e1d9f1fec6fc0098ed0000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:06 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000001c0)="f9", 0x1}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:06 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) 07:58:06 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x20000}, 0x20) [ 279.042473][T10234] loop4: detected capacity change from 0 to 34721 07:58:06 executing program 1: sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7191e0763a05d652afbfce3c8c57f4476c844ea1165c341d29bb2340e8aafbf1135f124a7a1d9242ab2616b05ec3b411e6a5573dd92f0006573746b1917e318ed07c768fe42c3cf24e3984d240800000010b8038ce4e1d9f1fec6fc0098ed0000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:06 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x20000}, 0x20) 07:58:06 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) 07:58:06 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x70}, 0x20) 07:58:06 executing program 1: socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7191e0763a05d652afbfce3c8c57f4476c844ea1165c341d29bb2340e8aafbf1135f124a7a1d9242ab2616b05ec3b411e6a5573dd92f0006573746b1917e318ed07c768fe42c3cf24e3984d240800000010b8038ce4e1d9f1fec6fc0098ed0000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:06 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5", 0x32, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, 0x0, 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:06 executing program 0: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x20000}, 0x20) 07:58:06 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000001c0)="f9", 0x1}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:06 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:06 executing program 1: socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7191e0763a05d652afbfce3c8c57f4476c844ea1165c341d29bb2340e8aafbf1135f124a7a1d9242ab2616b05ec3b411e6a5573dd92f0006573746b1917e318ed07c768fe42c3cf24e3984d240800000010b8038ce4e1d9f1fec6fc0098ed0000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:06 executing program 1: socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7191e0763a05d652afbfce3c8c57f4476c844ea1165c341d29bb2340e8aafbf1135f124a7a1d9242ab2616b05ec3b411e6a5573dd92f0006573746b1917e318ed07c768fe42c3cf24e3984d240800000010b8038ce4e1d9f1fec6fc0098ed0000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) [ 279.171737][T10258] loop4: detected capacity change from 0 to 34721 07:58:06 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, 0x0, 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:06 executing program 0: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x20000}, 0x20) 07:58:06 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, 0x0, 0x0) 07:58:06 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f00000001c0)="f9", 0x1}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:06 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979", 0x36, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:06 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:06 executing program 0: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x20000}, 0x20) 07:58:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, 0x0, 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:06 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, 0x0, 0x0) 07:58:06 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) [ 279.272881][T10279] loop4: detected capacity change from 0 to 34721 07:58:06 executing program 0: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 07:58:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:06 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, 0x0, 0x0) 07:58:06 executing program 0: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 07:58:06 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 07:58:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:07 executing program 0: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 07:58:07 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7191e0763a05d652afbfce3c8c57f4476c844ea1165c341d29bb2340e8aafbf1135f124a7a1d9242ab2616b05ec3b411e6a5573dd92f0006573746b1917e318ed07c768fe42c3cf24e3984d240800000010b8038ce4e1d9f1fec6fc0098ed0000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:07 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{0x0, 0x0, 0x8}, {&(0x7f00000001c0)="f9", 0x1}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:07 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979", 0x36, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:07 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 07:58:07 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) [ 279.420949][T10306] loop4: detected capacity change from 0 to 34721 07:58:07 executing program 0: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x20) 07:58:07 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7191e0763a05d652afbfce3c8c57f4476c844ea1165c341d29bb2340e8aafbf1135f124a7a1d9242ab2616b05ec3b411e6a5573dd92f0006573746b1917e318ed07c768fe42c3cf24e3984d240800000010b8038ce4e1d9f1fec6fc0098ed0000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:07 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:07 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:07 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7191e0763a05d652afbfce3c8c57f4476c844ea1165c341d29bb2340e8aafbf1135f124a7a1d9242ab2616b05ec3b411e6a5573dd92f0006573746b1917e318ed07c768fe42c3cf24e3984d240800000010b8038ce4e1d9f1fec6fc0098ed0000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:07 executing program 0: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x20) 07:58:07 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:07 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:07 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{0x0, 0x0, 0x8}, {&(0x7f00000001c0)="f9", 0x1}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 279.532730][T10329] loop4: detected capacity change from 0 to 34721 07:58:07 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979", 0x36, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:07 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:07 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7191e0763a05d652afbfce3c8c57f4476c844ea1165c341d29bb2340e8aafbf1135f124a7a1d9242ab2616b05ec3b411e6a5573dd92f0006573746b1917e318ed07c768fe42c3cf24e3984d240800000010b8038ce4e1d9f1fec6fc0098ed0000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:07 executing program 0: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x20) 07:58:07 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:07 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:07 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, 0x0, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:07 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979", 0x36, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:07 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:07 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{0x0, 0x0, 0x8}, {&(0x7f00000001c0)="f9", 0x1}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:07 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:07 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, 0x0, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:07 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2e", 0x38, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:07 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:07 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:07 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, 0x0, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:07 executing program 0: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x20) [ 279.640091][T10351] loop0: detected capacity change from 0 to 34721 [ 279.665119][T10358] loop4: detected capacity change from 0 to 34721 07:58:07 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={0x0, 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:07 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:07 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x7, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @cb_func]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:07 executing program 0: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x20) 07:58:07 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0), 0x0, 0x8}, {&(0x7f00000001c0)="f9", 0x1}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:07 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:07 executing program 0: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x20) 07:58:07 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2e", 0x38, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:07 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={0x0, 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:07 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:58:07 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x7, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @cb_func]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:07 executing program 0: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 279.790654][T10379] loop4: detected capacity change from 0 to 34721 07:58:07 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x7, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @cb_func]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:07 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={0x0, 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:07 executing program 0: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 07:58:07 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7191e0763a05d652afbfce3c8c57f4476c844ea1165c341d29bb2340e8aafbf1135f124a7a1d9242ab2616b05ec3b411e6a5573dd92f0006573746b1917e318ed07c768fe42c3cf24e3984d240800000010b8038ce4e1d9f1fec6fc0098ed0000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:07 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @cb_func, @cb_func]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:07 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0), 0x0, 0x8}, {&(0x7f00000001c0)="f9", 0x1}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:07 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7191e0763a05d652afbfce3c8c57f4476c844ea1165c341d29bb2340e8aafbf1135f124a7a1d9242ab2616b05ec3b411e6a5573dd92f0006573746b1917e318ed07c768fe42c3cf24e3984d240800000010b8038ce4e1d9f1fec6fc0098ed0000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:07 executing program 0: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 07:58:07 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:07 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @cb_func, @cb_func]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:07 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2e", 0x38, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:07 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7191e0763a05d652afbfce3c8c57f4476c844ea1165c341d29bb2340e8aafbf1135f124a7a1d9242ab2616b05ec3b411e6a5573dd92f0006573746b1917e318ed07c768fe42c3cf24e3984d240800000010b8038ce4e1d9f1fec6fc0098ed0000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:07 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0), 0x0, 0x8}, {&(0x7f00000001c0)="f9", 0x1}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 279.912588][T10404] loop4: detected capacity change from 0 to 34721 07:58:07 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:07 executing program 2: sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7191e0763a05d652afbfce3c8c57f4476c844ea1165c341d29bb2340e8aafbf1135f124a7a1d9242ab2616b05ec3b411e6a5573dd92f0006573746b1917e318ed07c768fe42c3cf24e3984d240800000010b8038ce4e1d9f1fec6fc0098ed0000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:07 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @cb_func, @cb_func]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:07 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:07 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x7, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:07 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:07 executing program 2: sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7191e0763a05d652afbfce3c8c57f4476c844ea1165c341d29bb2340e8aafbf1135f124a7a1d9242ab2616b05ec3b411e6a5573dd92f0006573746b1917e318ed07c768fe42c3cf24e3984d240800000010b8038ce4e1d9f1fec6fc0098ed0000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:07 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:07 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:07 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9", 0x39}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:07 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x7, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:07 executing program 2: sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7191e0763a05d652afbfce3c8c57f4476c844ea1165c341d29bb2340e8aafbf1135f124a7a1d9242ab2616b05ec3b411e6a5573dd92f0006573746b1917e318ed07c768fe42c3cf24e3984d240800000010b8038ce4e1d9f1fec6fc0098ed0000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:07 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:07 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:07 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9f28eaea86dae98c49c38d6d336f1295d4568a1df109dc0cdadb3c28b04ce8f52bac0f159d8a1f18190f44e7069b6cfea128f4cf41e34b32c", 0x71, 0x8}, {&(0x7f00000001c0)="f9", 0x1}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 280.053598][T10437] loop4: detected capacity change from 0 to 34721 07:58:07 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:07 executing program 2: socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7191e0763a05d652afbfce3c8c57f4476c844ea1165c341d29bb2340e8aafbf1135f124a7a1d9242ab2616b05ec3b411e6a5573dd92f0006573746b1917e318ed07c768fe42c3cf24e3984d240800000010b8038ce4e1d9f1fec6fc0098ed0000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:07 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x7, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:07 executing program 0: sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:07 executing program 2: socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7191e0763a05d652afbfce3c8c57f4476c844ea1165c341d29bb2340e8aafbf1135f124a7a1d9242ab2616b05ec3b411e6a5573dd92f0006573746b1917e318ed07c768fe42c3cf24e3984d240800000010b8038ce4e1d9f1fec6fc0098ed0000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:07 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x7, &(0x7f0000000000)=@framed={{}, [@cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:07 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9", 0x39}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:07 executing program 0: sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:07 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:07 executing program 2: socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7191e0763a05d652afbfce3c8c57f4476c844ea1165c341d29bb2340e8aafbf1135f124a7a1d9242ab2616b05ec3b411e6a5573dd92f0006573746b1917e318ed07c768fe42c3cf24e3984d240800000010b8038ce4e1d9f1fec6fc0098ed0000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:07 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x7, &(0x7f0000000000)=@framed={{}, [@cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:07 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0), 0x0, 0x8}, {&(0x7f00000001c0)="f9", 0x1}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:07 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x7, &(0x7f0000000000)=@framed={{}, [@cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:07 executing program 0: sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:07 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9", 0x39}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 280.180661][ T1836] I/O error, dev loop4, sector 34560 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 280.194233][T10461] loop4: detected capacity change from 0 to 34721 [ 280.196215][ T1836] I/O error, dev loop4, sector 34560 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 280.210259][ T1836] Buffer I/O error on dev loop4, logical block 34560, async page read 07:58:07 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, 0x0, 0x0) 07:58:07 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:07 executing program 0: socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:07 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9ed}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:07 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, 0x0, 0x0) 07:58:07 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) [ 280.288250][T10478] loop4: detected capacity change from 0 to 34721 [ 280.289322][ T1836] I/O error, dev loop4, sector 34560 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 280.317490][ T1836] I/O error, dev loop4, sector 34560 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 280.326995][ T1836] Buffer I/O error on dev loop4, logical block 34560, async page read 07:58:07 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:07 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, 0x0, 0x0) 07:58:07 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0), 0x0, 0x8}, {&(0x7f00000001c0)="f9", 0x1}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:07 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:07 executing program 0: socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:07 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9", 0x39, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x0, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:07 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:07 executing program 0: socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:07 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:07 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, 0x0, 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) [ 280.336934][ T1836] I/O error, dev loop4, sector 34561 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 280.346768][ T1836] Buffer I/O error on dev loop4, logical block 34561, async page read 07:58:07 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, 0x0, 0x0) 07:58:07 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:07 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:07 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, 0x0, 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:08 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0), 0x0, 0x8}, {&(0x7f00000001c0)="f9", 0x1}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:08 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, 0x0, 0x0) 07:58:08 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9", 0x39, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x0, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:08 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, 0x0, 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:08 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0, 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, 0x0, 0x0) [ 280.465775][T10520] loop4: detected capacity change from 0 to 34721 07:58:08 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0, 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9", 0x39, 0x8}, {&(0x7f00000001c0)="f9", 0x1}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:08 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:08 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9", 0x39, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x0, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:08 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0, 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:08 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) [ 280.575191][T10541] loop4: detected capacity change from 0 to 34721 07:58:08 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)='F', 0x1, 0x8}, {&(0x7f00000001c0)="f9", 0x1}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:08 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0xc3, &(0x7f00000000c0)=""/195, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:08 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9", 0x39, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, 0x0) 07:58:08 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:08 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:08 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0), 0x0, 0x8}, {&(0x7f00000001c0)="f9", 0x1}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:08 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0, 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) [ 280.702684][T10575] loop4: detected capacity change from 0 to 34721 07:58:08 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9", 0x39, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, 0x0) 07:58:08 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:08 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0, 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0, 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:08 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[], 0xc0}}, 0x0) 07:58:08 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0), 0x0, 0x8}, {&(0x7f00000001c0)="f9", 0x1}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:08 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9", 0x39, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x0, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) [ 280.833262][T10610] loop4: detected capacity change from 0 to 34721 07:58:08 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9", 0x39, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, 0x0) 07:58:08 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:08 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7d6c1091928843a6f915ac796922db7ceca7ce4a03d6964e0c7b060657c2dd538adbc06900d8dd91599390d1b6d887ea7"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0), 0x0, 0x8}, {&(0x7f00000001c0)="f9", 0x1}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:08 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x1, 0xa, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) 07:58:08 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) [ 280.873477][T10614] loop0: detected capacity change from 0 to 34721 [ 280.912590][T10624] loop4: detected capacity change from 0 to 34721 07:58:08 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x9, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:58:08 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9", 0x39, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:08 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0), 0x0, 0x8}, {&(0x7f00000001c0)="f9", 0x1}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:08 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 281.003888][T10641] loop4: detected capacity change from 0 to 34721 07:58:08 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, 0x0) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xa0, 0x0, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6b96}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}, @NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8}, {0x8, 0x1, r4}, {0x8}, {0x8}, {0x8}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0x7, 0xa, '9p\x00'}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x108}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffffffffcbc8}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0xa0}, 0x1, 0x0, 0x0, 0x40000}, 0x880) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240), 0x80200, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r5) keyctl$setperm(0x5, 0x0, 0x20001000) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x800) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x80030, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@version_L}, {@posixacl}, {@fscache}, {@loose}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@smackfsroot={'smackfsroot', 0x3d, '-))\\]'}}, {@subj_role={'subj_role', 0x3d, '$+,^'}}, {@fsname={'fsname', 0x3d, '%'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '5'}}, {@fsname}, {@obj_user={'obj_user', 0x3d, '+{}}#*'}}]}}) 07:58:08 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5de372c9f785254ce0f3bb001ff26ee5146cc58c4b13c01c7"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 07:58:08 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)='F', 0x1}, {&(0x7f00000001c0)="f9", 0x1}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:08 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9", 0x39, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:08 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 07:58:08 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x445cc0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0xa0c1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), r0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x40800, 0x0) getsockname$l2tp(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @initdev}, &(0x7f00000001c0)=0x10) syz_open_procfs$userns(0x0, &(0x7f0000000180)) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r0) 07:58:08 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, 0x0) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xa0, 0x0, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6b96}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}, @NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8}, {0x8, 0x1, r4}, {0x8}, {0x8}, {0x8}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0x7, 0xa, '9p\x00'}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x108}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffffffffcbc8}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0xa0}, 0x1, 0x0, 0x0, 0x40000}, 0x880) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240), 0x80200, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r5) keyctl$setperm(0x5, 0x0, 0x20001000) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x800) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x80030, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@version_L}, {@posixacl}, {@fscache}, {@loose}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@smackfsroot={'smackfsroot', 0x3d, '-))\\]'}}, {@subj_role={'subj_role', 0x3d, '$+,^'}}, {@fsname={'fsname', 0x3d, '%'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '5'}}, {@fsname}, {@obj_user={'obj_user', 0x3d, '+{}}#*'}}]}}) 07:58:08 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x445cc0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0xa0c1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), r0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x40800, 0x0) getsockname$l2tp(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @initdev}, &(0x7f00000001c0)=0x10) syz_open_procfs$userns(0x0, &(0x7f0000000180)) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r0) 07:58:08 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0ef5581cd6e2298e3ab9c0ac5"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) [ 281.095448][T10660] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10660 comm=syz-executor.1 [ 281.127146][T10666] loop4: detected capacity change from 0 to 34721 07:58:08 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)='F', 0x1}, {&(0x7f00000001c0)="f9", 0x1}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x0, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:08 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9", 0x39, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:08 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x445cc0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0xa0c1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), r0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x40800, 0x0) getsockname$l2tp(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @initdev}, &(0x7f00000001c0)=0x10) syz_open_procfs$userns(0x0, &(0x7f0000000180)) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r0) 07:58:08 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, 0x0) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xa0, 0x0, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6b96}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}, @NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8}, {0x8, 0x1, r4}, {0x8}, {0x8}, {0x8}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0x7, 0xa, '9p\x00'}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x108}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffffffffcbc8}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0xa0}, 0x1, 0x0, 0x0, 0x40000}, 0x880) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240), 0x80200, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r5) keyctl$setperm(0x5, 0x0, 0x20001000) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x800) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x80030, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@version_L}, {@posixacl}, {@fscache}, {@loose}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@smackfsroot={'smackfsroot', 0x3d, '-))\\]'}}, {@subj_role={'subj_role', 0x3d, '$+,^'}}, {@fsname={'fsname', 0x3d, '%'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '5'}}, {@fsname}, {@obj_user={'obj_user', 0x3d, '+{}}#*'}}]}}) [ 281.176055][T10675] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10675 comm=syz-executor.1 07:58:08 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, 0x0) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xa0, 0x0, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6b96}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}, @NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8}, {0x8, 0x1, r4}, {0x8}, {0x8}, {0x8}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0x7, 0xa, '9p\x00'}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x108}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffffffffcbc8}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0xa0}, 0x1, 0x0, 0x0, 0x40000}, 0x880) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240), 0x80200, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r5) keyctl$setperm(0x5, 0x0, 0x20001000) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:08 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x445cc0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0xa0c1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), r0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x40800, 0x0) getsockname$l2tp(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @initdev}, &(0x7f00000001c0)=0x10) syz_open_procfs$userns(0x0, &(0x7f0000000180)) 07:58:08 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c000000064"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) [ 281.244097][T10687] loop4: detected capacity change from 0 to 34721 [ 281.248041][T10691] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10691 comm=syz-executor.1 07:58:08 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404000295c1dea0"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)='F', 0x1}, {&(0x7f00000001c0)="f9", 0x1}, {&(0x7f0000000240)="7f", 0x1}, {&(0x7f0000000280)="d0", 0x1}], 0x0, 0x0) 07:58:08 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9", 0x39, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}]}) 07:58:08 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, 0x0) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xa0, 0x0, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6b96}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}, @NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8}, {0x8, 0x1, r4}, {0x8}, {0x8}, {0x8}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0x7, 0xa, '9p\x00'}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x108}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffffffffcbc8}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0xa0}, 0x1, 0x0, 0x0, 0x40000}, 0x880) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240), 0x80200, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r5) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:08 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x445cc0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0xa0c1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), r0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x40800, 0x0) getsockname$l2tp(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @initdev}, &(0x7f00000001c0)=0x10) 07:58:08 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c000000064"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) [ 281.299881][T10702] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=100 sclass=netlink_audit_socket pid=10702 comm=syz-executor.1 07:58:08 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, 0x0) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xa0, 0x0, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6b96}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}, @NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8}, {0x8, 0x1, r4}, {0x8}, {0x8}, {0x8}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0x7, 0xa, '9p\x00'}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x108}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffffffffcbc8}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0xa0}, 0x1, 0x0, 0x0, 0x40000}, 0x880) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240), 0x80200, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:08 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x445cc0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0xa0c1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), r0) getsockname$l2tp(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @initdev}, &(0x7f00000001c0)=0x10) 07:58:08 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x445cc0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0xa0c1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) getsockname$l2tp(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @initdev}, &(0x7f00000001c0)=0x10) 07:58:08 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c000000064"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:08 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, 0x0) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xa0, 0x0, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6b96}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}, @NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8}, {0x8, 0x1, r4}, {0x8}, {0x8}, {0x8}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0x7, 0xa, '9p\x00'}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x108}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffffffffcbc8}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0xa0}, 0x1, 0x0, 0x0, 0x40000}, 0x880) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240), 0x80200, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) [ 281.342735][T10710] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=100 sclass=netlink_audit_socket pid=10710 comm=syz-executor.1 07:58:08 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x445cc0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0xa0c1, 0x0) getsockname$l2tp(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @initdev}, &(0x7f00000001c0)=0x10) [ 281.410292][T10722] loop4: detected capacity change from 0 to 34721 [ 281.410511][T10724] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=100 sclass=netlink_audit_socket pid=10724 comm=syz-executor.1 07:58:09 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9", 0x39, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}]}) 07:58:09 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, 0x0) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xa0, 0x0, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6b96}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}, @NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8}, {0x8, 0x1, r4}, {0x8}, {0x8}, {0x8}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0x7, 0xa, '9p\x00'}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x108}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffffffffcbc8}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0xa0}, 0x1, 0x0, 0x0, 0x40000}, 0x880) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240), 0x80200, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:09 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:09 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x445cc0, 0x0) getsockname$l2tp(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @initdev}, &(0x7f00000001c0)=0x10) 07:58:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, 0x0) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xa0, 0x0, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6b96}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}, @NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8}, {0x8, 0x1, r4}, {0x8}, {0x8}, {0x8}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0x7, 0xa, '9p\x00'}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x108}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffffffffcbc8}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0xa0}, 0x1, 0x0, 0x0, 0x40000}, 0x880) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:09 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404"], 0xc0}}, 0x0) 07:58:09 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, 0x0) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xa0, 0x0, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6b96}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}, @NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8}, {0x8, 0x1, r4}, {0x8}, {0x8}, {0x8}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0x7, 0xa, '9p\x00'}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x108}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffffffffcbc8}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0xa0}, 0x1, 0x0, 0x0, 0x40000}, 0x880) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240), 0x80200, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:09 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:09 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) getsockname$l2tp(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @initdev}, &(0x7f00000001c0)=0x10) 07:58:09 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c000000064"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:09 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) [ 281.529671][T10749] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=100 sclass=netlink_audit_socket pid=10749 comm=syz-executor.1 [ 281.570260][T10754] loop4: detected capacity change from 0 to 34721 07:58:09 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9", 0x39, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}]}) 07:58:09 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, 0x0) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xa0, 0x0, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6b96}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}, @NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8}, {0x8, 0x1, r4}, {0x8}, {0x8}, {0x8}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0x7, 0xa, '9p\x00'}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x108}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffffffffcbc8}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0xa0}, 0x1, 0x0, 0x0, 0x40000}, 0x880) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240), 0x80200, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:09 executing program 5: getsockname$l2tp(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @initdev}, &(0x7f00000001c0)=0x10) 07:58:09 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c000000064"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:09 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:09 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:09 executing program 5: getsockname$l2tp(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) 07:58:09 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, 0x0) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xa0, 0x0, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6b96}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}, @NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8}, {0x8, 0x1, r4}, {0x8}, {0x8}, {0x8}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0x7, 0xa, '9p\x00'}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x108}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffffffffcbc8}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0xa0}, 0x1, 0x0, 0x0, 0x40000}, 0x880) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:09 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c000000064"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) [ 281.644957][T10764] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=100 sclass=netlink_audit_socket pid=10764 comm=syz-executor.1 07:58:09 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:09 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9", 0x39, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:09 executing program 5: getsockname$l2tp(0xffffffffffffffff, 0x0, 0x0) 07:58:09 executing program 1: sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c000000064"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:09 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:09 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) [ 281.685896][T10771] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=100 sclass=netlink_audit_socket pid=10771 comm=syz-executor.1 [ 281.710071][T10776] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10776 comm=syz-executor.2 [ 281.728174][T10778] loop4: detected capacity change from 0 to 34721 07:58:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:09 executing program 1: sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c000000064"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:09 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, 0x0) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xa0, 0x0, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6b96}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}, @NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8}, {0x8, 0x1, r4}, {0x8}, {0x8}, {0x8}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0x7, 0xa, '9p\x00'}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x108}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffffffffcbc8}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0xa0}, 0x1, 0x0, 0x0, 0x40000}, 0x880) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240), 0x80200, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r5) keyctl$setperm(0x5, 0x0, 0x20001000) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:09 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:09 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:09 executing program 1: sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c000000064"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:09 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9", 0x39, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:09 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c000000064"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:09 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:09 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, 0x0) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xa0, 0x0, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6b96}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}, @NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8}, {0x8, 0x1, r4}, {0x8}, {0x8}, {0x8}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0x7, 0xa, '9p\x00'}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x108}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffffffffcbc8}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0xa0}, 0x1, 0x0, 0x0, 0x40000}, 0x880) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240), 0x80200, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r5) keyctl$setperm(0x5, 0x0, 0x20001000) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:09 executing program 1: socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c000000064"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) [ 281.842967][T10802] loop4: detected capacity change from 0 to 34721 07:58:09 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, 0x0) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xa0, 0x0, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6b96}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}, @NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8}, {0x8, 0x1, r4}, {0x8}, {0x8}, {0x8}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0x7, 0xa, '9p\x00'}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x108}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffffffffcbc8}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0xa0}, 0x1, 0x0, 0x0, 0x40000}, 0x880) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240), 0x80200, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r5) keyctl$setperm(0x5, 0x0, 0x20001000) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:09 executing program 1: socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c000000064"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:09 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c000000064"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:09 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:09 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9", 0x39, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_type}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:09 executing program 1: socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c000000064"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:09 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, 0x0) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xa0, 0x0, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6b96}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}, @NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8}, {0x8, 0x1, r4}, {0x8}, {0x8}, {0x8}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0x7, 0xa, '9p\x00'}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x108}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffffffffcbc8}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0xa0}, 0x1, 0x0, 0x0, 0x40000}, 0x880) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240), 0x80200, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r5) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:09 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c000000064"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) [ 281.949410][ T1836] I/O error, dev loop4, sector 34560 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 07:58:09 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:09 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, 0x0, 0x0) 07:58:09 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9", 0x39, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:09 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000006404"], 0xc0}}, 0x0) 07:58:09 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, 0x0) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xa0, 0x0, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6b96}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}, @NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8}, {0x8, 0x1, r4}, {0x8}, {0x8}, {0x8}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0x7, 0xa, '9p\x00'}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x108}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffffffffcbc8}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0xa0}, 0x1, 0x0, 0x0, 0x40000}, 0x880) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240), 0x80200, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) [ 281.992831][T10826] loop4: detected capacity change from 0 to 34721 07:58:09 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, 0x0, 0x0) 07:58:09 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, 0x0) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xa0, 0x0, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6b96}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}, @NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8}, {0x8, 0x1, r4}, {0x8}, {0x8}, {0x8}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0x7, 0xa, '9p\x00'}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x108}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffffffffcbc8}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0xa0}, 0x1, 0x0, 0x0, 0x40000}, 0x880) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:09 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:09 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:09 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9", 0x39, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:09 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, 0x0, 0x0) 07:58:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) [ 282.083151][ T1836] I/O error, dev loop4, sector 34560 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 282.095780][T10848] loop4: detected capacity change from 0 to 34721 07:58:09 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:09 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:09 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9", 0x39, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:09 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:09 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c000000064"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:09 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:09 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:09 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9", 0x39, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:09 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c000000064"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) [ 282.178549][ T1836] I/O error, dev loop4, sector 34560 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 07:58:09 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:09 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c000000064"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:09 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:09 executing program 2: sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pipe2$9p(&(0x7f00000000c0), 0x800) [ 282.242429][T10878] loop4: detected capacity change from 0 to 34721 07:58:09 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:09 executing program 2: sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:09 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9", 0x39, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:09 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:09 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, 0x0, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:09 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:09 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:09 executing program 2: sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:09 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, 0x0, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:09 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:09 executing program 2: socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:09 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, 0x0, 0x1, 0x0, 0x0, 0x24000084}, 0x0) [ 282.402974][ T1836] I/O error, dev loop4, sector 34560 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 282.418876][T10911] loop4: detected capacity change from 0 to 34721 07:58:10 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9", 0x39, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@euid_eq}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:10 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:10 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:10 executing program 2: socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:10 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:10 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={0x0, 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:10 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:10 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={0x0, 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:10 executing program 2: socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:10 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:10 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:10 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) pipe2$9p(&(0x7f00000000c0), 0x800) [ 282.540932][ T1836] I/O error, dev loop4, sector 34560 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 282.560005][T10939] loop4: detected capacity change from 0 to 34721 [ 282.572348][ T1836] Buffer I/O error on dev loop4, logical block 34560, async page read 07:58:10 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9", 0x39, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:10 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:10 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, 0x0, 0x0) 07:58:10 executing program 0: setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:10 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={0x0, 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:10 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:10 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) [ 282.590635][ T1836] Buffer I/O error on dev loop4, logical block 34561, async page read [ 282.610697][ T1836] Buffer I/O error on dev loop4, logical block 34562, async page read [ 282.622000][ T1836] Buffer I/O error on dev loop4, logical block 34563, async page read [ 282.631597][ T1836] Buffer I/O error on dev loop4, logical block 34564, async page read 07:58:10 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:10 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, 0x0, 0x0) 07:58:10 executing program 3: setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:10 executing program 0: setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:10 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) [ 282.724772][T10962] loop4: detected capacity change from 0 to 34721 07:58:10 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9", 0x39, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:10 executing program 0: setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:10 executing program 3: setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:10 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:10 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, 0x0, 0x0) 07:58:10 executing program 3: setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:10 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:10 executing program 0: setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:10 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:10 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:10 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:10 executing program 3: setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) [ 282.905061][T10987] loop4: detected capacity change from 0 to 34721 07:58:10 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="467606d7682f6ece4452a7d74813d373bea293a5159d55d292081084eef6a945f30dc14b14a86820ff01990cd8e19e4388c5b1887979fe2eb9", 0x39, 0x8}, {&(0x7f0000000280)="d0", 0x1, 0x897a1b7}], 0x800001, &(0x7f00000004c0)={[{@utf8}], [{@dont_hash}, {@subj_type}, {@subj_user={'subj_user', 0x3d, 'nomand\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '(&['}}]}) 07:58:10 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:10 executing program 0: setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000), 0x2) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:10 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:10 executing program 3: setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000), 0x2) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:10 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:10 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:10 executing program 3: setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000), 0x2) pipe2$9p(0x0, 0x800) 07:58:10 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:10 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:10 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:10 executing program 0: setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000), 0x2) pipe2$9p(0x0, 0x800) 07:58:10 executing program 3: setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000), 0x2) pipe2$9p(0x0, 0x800) 07:58:10 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:10 executing program 0: setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000), 0x2) pipe2$9p(0x0, 0x800) 07:58:10 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0, 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:10 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:10 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:10 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:10 executing program 3: setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000), 0x2) pipe2$9p(0x0, 0x800) 07:58:10 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:10 executing program 0: setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000), 0x2) pipe2$9p(0x0, 0x800) 07:58:10 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:10 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0, 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:10 executing program 5: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:10 executing program 3: setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000), 0x2) pipe2$9p(&(0x7f00000000c0), 0x0) 07:58:10 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:10 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:10 executing program 0: setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000), 0x2) pipe2$9p(&(0x7f00000000c0), 0x0) 07:58:10 executing program 0: setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000), 0x2) pipe2$9p(0x0, 0x800) 07:58:10 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0, 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:10 executing program 4: pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:10 executing program 3: setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000), 0x2) pipe2$9p(0x0, 0x800) 07:58:10 executing program 5: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:10 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c0000000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:10 executing program 3: setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000), 0x2) pipe2$9p(0x0, 0x800) 07:58:10 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:10 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c0000000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:10 executing program 0: setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000), 0x2) pipe2$9p(0x0, 0x800) 07:58:10 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:10 executing program 3: setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000), 0x2) pipe2$9p(0x0, 0x800) 07:58:10 executing program 5: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:10 executing program 4: pipe2$9p(0x0, 0x800) 07:58:10 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c0000000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:10 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:10 executing program 3: pipe2$9p(0x0, 0x800) 07:58:10 executing program 0: setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000), 0x2) pipe2$9p(0x0, 0x800) 07:58:10 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c000000064"], 0xc0}}, 0x0) 07:58:10 executing program 4: pipe2$9p(0x0, 0x800) 07:58:10 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:10 executing program 0: pipe2$9p(0x0, 0x800) 07:58:10 executing program 5: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:10 executing program 3: pipe2$9p(0x0, 0x0) 07:58:11 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c000000064"], 0xc0}}, 0x0) 07:58:11 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:11 executing program 0: pipe2$9p(0x0, 0x0) 07:58:11 executing program 5: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) pipe2$9p(0x0, 0x800) 07:58:11 executing program 4: pipe2$9p(0x0, 0x800) 07:58:11 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c000000064"], 0xc0}}, 0x0) 07:58:11 executing program 4: pipe2$9p(&(0x7f00000000c0), 0x0) 07:58:11 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xe98090bb961a10f) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pipe2$9p(&(0x7f00000000c0), 0x800) 07:58:11 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 5: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) pipe2$9p(0x0, 0x800) 07:58:11 executing program 1: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) pipe2$9p(0x0, 0x800) 07:58:11 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x445cc0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0xa0c1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), r0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x40800, 0x0) getsockname$l2tp(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @initdev}, &(0x7f00000001c0)=0x10) syz_open_procfs$userns(0x0, &(0x7f0000000180)) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r0) 07:58:11 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) eventfd2(0x4, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0x3, 0xffffffff, 0x590, 0x4a1, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x4}, 0x48) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1f, 0xffffffff, 0x3, 0x0, r0, 0x6, '\x00', 0x0, r1, 0x5, 0x3, 0x0, 0x10}, 0x48) r2 = fsmount(r1, 0x1, 0x1) setsockopt$WPAN_SECURITY(r2, 0x0, 0x1, &(0x7f0000000100)=0x1, 0x4) 07:58:11 executing program 5: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) pipe2$9p(0x0, 0x800) 07:58:11 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c0"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x445cc0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0xa0c1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), r0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x40800, 0x0) getsockname$l2tp(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @initdev}, &(0x7f00000001c0)=0x10) syz_open_procfs$userns(0x0, &(0x7f0000000180)) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r0) 07:58:11 executing program 5: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) pipe2$9p(&(0x7f00000000c0), 0x0) 07:58:11 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) eventfd2(0x4, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0x3, 0xffffffff, 0x590, 0x4a1, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x4}, 0x48) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1f, 0xffffffff, 0x3, 0x0, r0, 0x6, '\x00', 0x0, r1, 0x5, 0x3, 0x0, 0x10}, 0x48) r2 = fsmount(r1, 0x1, 0x1) setsockopt$WPAN_SECURITY(r2, 0x0, 0x1, &(0x7f0000000100)=0x1, 0x4) 07:58:11 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x20c641, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x5) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = fspick(r0, &(0x7f0000000140)='./file0\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r2, 0x4, &(0x7f0000000180)='/dev/vcsa\x00', &(0x7f00000001c0)='./file0\x00', r0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x7e, 0x2, 0x1, 0x812, r0, 0xcb9e, '\x00', 0x0, r1, 0x4, 0x4, 0x2}, 0x48) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000240)={0x80, 0x70, 0x0, {r3}}, 0x20) 07:58:11 executing program 0: sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x445cc0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0xa0c1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), r0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x40800, 0x0) getsockname$l2tp(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @initdev}, &(0x7f00000001c0)=0x10) syz_open_procfs$userns(0x0, &(0x7f0000000180)) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r0) 07:58:11 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) eventfd2(0x4, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0x3, 0xffffffff, 0x590, 0x4a1, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x4}, 0x48) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1f, 0xffffffff, 0x3, 0x0, r0, 0x6, '\x00', 0x0, r1, 0x5, 0x3, 0x0, 0x10}, 0x48) r2 = fsmount(r1, 0x1, 0x1) setsockopt$WPAN_SECURITY(r2, 0x0, 0x1, &(0x7f0000000100)=0x1, 0x4) 07:58:11 executing program 0: sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 3: sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) eventfd2(0x4, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0x3, 0xffffffff, 0x590, 0x4a1, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x4}, 0x48) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1f, 0xffffffff, 0x3, 0x0, r0, 0x6, '\x00', 0x0, r1, 0x5, 0x3, 0x0, 0x10}, 0x48) fsmount(r1, 0x1, 0x1) 07:58:11 executing program 3: sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x20c641, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x5) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = fspick(r0, &(0x7f0000000140)='./file0\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r2, 0x4, &(0x7f0000000180)='/dev/vcsa\x00', &(0x7f00000001c0)='./file0\x00', r0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x7e, 0x2, 0x1, 0x812, r0, 0xcb9e, '\x00', 0x0, r1, 0x4, 0x4, 0x2}, 0x48) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000240)={0x80, 0x70, 0x0, {r3}}, 0x20) 07:58:11 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x445cc0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0xa0c1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), r0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x40800, 0x0) getsockname$l2tp(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @initdev}, &(0x7f00000001c0)=0x10) syz_open_procfs$userns(0x0, &(0x7f0000000180)) 07:58:11 executing program 0: sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) eventfd2(0x4, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0x3, 0xffffffff, 0x590, 0x4a1, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x4}, 0x48) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1f, 0xffffffff, 0x3, 0x0, r0, 0x6, '\x00', 0x0, r1, 0x5, 0x3, 0x0, 0x10}, 0x48) 07:58:11 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x20c641, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x5) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = fspick(r0, &(0x7f0000000140)='./file0\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r2, 0x4, &(0x7f0000000180)='/dev/vcsa\x00', &(0x7f00000001c0)='./file0\x00', r0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x7e, 0x2, 0x1, 0x812, r0, 0xcb9e, '\x00', 0x0, r1, 0x4, 0x4, 0x2}, 0x48) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000240)={0x80, 0x70, 0x0, {r3}}, 0x20) 07:58:11 executing program 3: sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 0: socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c0"], 0xc0}}, 0x0) 07:58:11 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x445cc0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0xa0c1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), r0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x40800, 0x0) getsockname$l2tp(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @initdev}, &(0x7f00000001c0)=0x10) 07:58:11 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x20c641, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x5) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = fspick(r0, &(0x7f0000000140)='./file0\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r2, 0x4, &(0x7f0000000180)='/dev/vcsa\x00', &(0x7f00000001c0)='./file0\x00', r0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x7e, 0x2, 0x1, 0x812, r0, 0xcb9e, '\x00', 0x0, r1, 0x4, 0x4, 0x2}, 0x48) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000240)={0x80, 0x70, 0x0, {r3}}, 0x20) 07:58:11 executing program 0: socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 3: socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) eventfd2(0x4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0x3, 0xffffffff, 0x590, 0x4a1, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x4}, 0x48) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 07:58:11 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x20c641, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x5) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = fspick(r0, &(0x7f0000000140)='./file0\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r2, 0x4, &(0x7f0000000180)='/dev/vcsa\x00', &(0x7f00000001c0)='./file0\x00', r0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x7e, 0x2, 0x1, 0x812, r0, 0xcb9e, '\x00', 0x0, r1, 0x4, 0x4, 0x2}, 0x48) mount_setattr(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000240)={0x80, 0x70}, 0x20) 07:58:11 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x445cc0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0xa0c1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), r0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x40800, 0x0) 07:58:11 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x20c641, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x5) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = fspick(r0, &(0x7f0000000140)='./file0\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r2, 0x4, &(0x7f0000000180)='/dev/vcsa\x00', &(0x7f00000001c0)='./file0\x00', r0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x7e, 0x2, 0x1, 0x812, r0, 0xcb9e, '\x00', 0x0, r1, 0x4, 0x4, 0x2}, 0x48) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000240)={0x80, 0x70, 0x0, {r3}}, 0x20) 07:58:11 executing program 0: socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) eventfd2(0x4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0x3, 0xffffffff, 0x590, 0x4a1, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x4}, 0x48) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) 07:58:11 executing program 3: socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x445cc0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0xa0c1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), r0) 07:58:11 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x20c641, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x5) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = fspick(r0, &(0x7f0000000140)='./file0\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r2, 0x4, &(0x7f0000000180)='/dev/vcsa\x00', &(0x7f00000001c0)='./file0\x00', r0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000240)={0x80, 0x70}, 0x20) 07:58:11 executing program 3: socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) eventfd2(0x4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0x3, 0xffffffff, 0x590, 0x4a1, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x4}, 0x48) 07:58:11 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, 0x0, 0x0) 07:58:11 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x20c641, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x5) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = fspick(r0, &(0x7f0000000140)='./file0\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r2, 0x4, &(0x7f0000000180)='/dev/vcsa\x00', &(0x7f00000001c0)='./file0\x00', r0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x7e, 0x2, 0x1, 0x812, r0, 0xcb9e, '\x00', 0x0, r1, 0x4, 0x4, 0x2}, 0x48) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000240)={0x80, 0x70, 0x0, {r3}}, 0x20) 07:58:11 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x445cc0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0xa0c1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 07:58:11 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x20c641, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x5) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) fspick(r0, &(0x7f0000000140)='./file0\x00', 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000240)={0x80, 0x70}, 0x20) 07:58:11 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, 0x0, 0x0) 07:58:11 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, 0x0, 0x0) 07:58:11 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) eventfd2(0x4, 0x0) 07:58:11 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, 0x0, 0x0) 07:58:11 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x20c641, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x5) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000240)={0x80, 0x70}, 0x20) 07:58:11 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x445cc0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0xa0c1, 0x0) 07:58:11 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x20c641, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x5) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = fspick(r0, &(0x7f0000000140)='./file0\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r2, 0x4, &(0x7f0000000180)='/dev/vcsa\x00', &(0x7f00000001c0)='./file0\x00', r0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x7e, 0x2, 0x1, 0x812, r0, 0xcb9e, '\x00', 0x0, r1, 0x4, 0x4, 0x2}, 0x48) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000240)={0x80, 0x70, 0x0, {r3}}, 0x20) 07:58:11 executing program 1: eventfd2(0x4, 0x0) 07:58:11 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, 0x0, 0x0) 07:58:11 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x20c641, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x5) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = fspick(r0, &(0x7f0000000140)='./file0\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r2, 0x4, &(0x7f0000000180)='/dev/vcsa\x00', &(0x7f00000001c0)='./file0\x00', r0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x7e, 0x2, 0x1, 0x812, r0, 0xcb9e, '\x00', 0x0, r1, 0x4, 0x4, 0x2}, 0x48) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) 07:58:11 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0xa0c1, 0x0) 07:58:11 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, 0x0, 0x0) 07:58:11 executing program 1: eventfd2(0x0, 0x0) 07:58:11 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x20c641, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x5) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000240)={0x80, 0x70}, 0x20) 07:58:11 executing program 4: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0xa0c1, 0x0) 07:58:11 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x20c641, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x5) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = fspick(r0, &(0x7f0000000140)='./file0\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r2, 0x4, &(0x7f0000000180)='/dev/vcsa\x00', &(0x7f00000001c0)='./file0\x00', r0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x7e, 0x2, 0x1, 0x812, r0, 0xcb9e, '\x00', 0x0, r1, 0x4, 0x4, 0x2}, 0x48) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) 07:58:11 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="090000000000000018100000", @ANYRES32, @ANYBLOB="0000000e0000000018100000", @ANYRES32, @ANYBLOB="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"], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = socket(0x23, 0xa, 0x9) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x208011, &(0x7f00000001c0)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x1}}, {@access_user}, {@access_client}, {@debug}, {@cache_none}]}}) 07:58:11 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x20c641, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x5) mount_setattr(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000240)={0x80, 0x70}, 0x20) 07:58:11 executing program 4: openat$vcsa(0xffffffffffffff9c, 0x0, 0xa0c1, 0x0) 07:58:11 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="090000000000000018100000", @ANYRES32, @ANYBLOB="0000000e0000000018100000", @ANYRES32, @ANYBLOB="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"], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = socket(0x23, 0xa, 0x9) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x208011, &(0x7f00000001c0)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x1}}, {@access_user}, {@access_client}, {@debug}, {@cache_none}]}}) 07:58:11 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x20c641, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x5) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = fspick(r0, &(0x7f0000000140)='./file0\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r2, 0x4, &(0x7f0000000180)='/dev/vcsa\x00', &(0x7f00000001c0)='./file0\x00', r0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x7e, 0x2, 0x1, 0x812, r0, 0xcb9e, '\x00', 0x0, r1, 0x4, 0x4, 0x2}, 0x48) 07:58:11 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 4: openat$vcsa(0xffffffffffffff9c, 0x0, 0xa0c1, 0x0) 07:58:11 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x20c641, 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000240)={0x80, 0x70}, 0x20) 07:58:11 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="090000000000000018100000", @ANYRES32, @ANYBLOB="0000000e0000000018100000", @ANYRES32, @ANYBLOB="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"], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = socket(0x23, 0xa, 0x9) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x208011, &(0x7f00000001c0)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize', 0x3d, 0x1}}, {@access_user}, {@access_client}, {@debug}, {@cache_none}]}}) 07:58:11 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x20c641, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x5) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = fspick(r0, &(0x7f0000000140)='./file0\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r2, 0x4, &(0x7f0000000180)='/dev/vcsa\x00', &(0x7f00000001c0)='./file0\x00', r0) 07:58:11 executing program 4: openat$vcsa(0xffffffffffffff9c, 0x0, 0xa0c1, 0x0) 07:58:11 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0, 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000240)={0x80, 0x70}, 0x20) 07:58:11 executing program 4: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) 07:58:11 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x20c641, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x5) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) fspick(r0, &(0x7f0000000140)='./file0\x00', 0x0) 07:58:11 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="090000000000000018100000", @ANYRES32, @ANYBLOB="0000000e0000000018100000", @ANYRES32, @ANYBLOB="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"], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket(0x23, 0xa, 0x9) 07:58:11 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0, 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0, 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x20c641, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x5) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) 07:58:11 executing program 5: mount_setattr(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000240)={0x80, 0x70}, 0x20) 07:58:11 executing program 4: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) 07:58:11 executing program 1: socket(0x23, 0xa, 0x9) 07:58:11 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0, 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0, 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 5: mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000240)={0x80, 0x70}, 0x20) 07:58:11 executing program 4: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) 07:58:11 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x20c641, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x5) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) 07:58:11 executing program 1: socket(0x0, 0xa, 0x9) 07:58:11 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x20c641, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x5) 07:58:11 executing program 4: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) keyctl$chown(0x4, r3, r4, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r5 = request_key(&(0x7f00000014c0)='.request_key_auth\x00', &(0x7f0000001500)={'syz', 0x3}, &(0x7f0000001540)='\x00', 0xfffffffffffffffb) socket$l2tp(0x2, 0x2, 0x73) add_key$keyring(&(0x7f0000001440), &(0x7f0000001480)={'syz', 0x0}, 0x0, 0x0, r5) r6 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r6) add_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="d2ab1e3e108b9c7e27f1c0b8b147dbd49a5296b2a5baeba2b73391425f0e89c5476b9e7e45f5e2eea827d4c277c8867283396f1b8422f731d8773368823db2a0a089ecea782e9ed5bd9d9c1042454c9bc5e0fa9bd2596f09a60ebffadb6fc1c557f7a601885d6d911763555dd6e90a024a3847c6b03a0356201c62258ab4c14795450a2b1bb4de24c43b1c8730d637e04117921d39e2415c5bbe0c3530ed20ea9148e2892dd632276c47d73fd8f0dd3c4dccc3302e09e8c38f0d728aed4572eeed2c63e78bd3d599e36e643857225917e00a9025be42244e811fdf", 0xdb, r6) 07:58:11 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0, 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 5: mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000240)={0x80, 0x70}, 0x20) 07:58:11 executing program 1: socket(0x0, 0xa, 0x9) 07:58:11 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x5) 07:58:11 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 5: mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000240)={0x80, 0x70}, 0x20) 07:58:11 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:11 executing program 4: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) keyctl$chown(0x4, r3, r4, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r5 = request_key(&(0x7f00000014c0)='.request_key_auth\x00', &(0x7f0000001500)={'syz', 0x3}, &(0x7f0000001540)='\x00', 0xfffffffffffffffb) socket$l2tp(0x2, 0x2, 0x73) add_key$keyring(&(0x7f0000001440), &(0x7f0000001480)={'syz', 0x0}, 0x0, 0x0, r5) r6 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r6) add_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="d2ab1e3e108b9c7e27f1c0b8b147dbd49a5296b2a5baeba2b73391425f0e89c5476b9e7e45f5e2eea827d4c277c8867283396f1b8422f731d8773368823db2a0a089ecea782e9ed5bd9d9c1042454c9bc5e0fa9bd2596f09a60ebffadb6fc1c557f7a601885d6d911763555dd6e90a024a3847c6b03a0356201c62258ab4c14795450a2b1bb4de24c43b1c8730d637e04117921d39e2415c5bbe0c3530ed20ea9148e2892dd632276c47d73fd8f0dd3c4dccc3302e09e8c38f0d728aed4572eeed2c63e78bd3d599e36e643857225917e00a9025be42244e811fdf", 0xdb, r6) 07:58:12 executing program 5: mount_setattr(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) 07:58:12 executing program 1: socket(0x0, 0xa, 0x9) 07:58:12 executing program 4: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) keyctl$chown(0x4, r3, r4, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r5 = request_key(&(0x7f00000014c0)='.request_key_auth\x00', &(0x7f0000001500)={'syz', 0x3}, &(0x7f0000001540)='\x00', 0xfffffffffffffffb) socket$l2tp(0x2, 0x2, 0x73) add_key$keyring(&(0x7f0000001440), &(0x7f0000001480)={'syz', 0x0}, 0x0, 0x0, r5) r6 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r6) add_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="d2ab1e3e108b9c7e27f1c0b8b147dbd49a5296b2a5baeba2b73391425f0e89c5476b9e7e45f5e2eea827d4c277c8867283396f1b8422f731d8773368823db2a0a089ecea782e9ed5bd9d9c1042454c9bc5e0fa9bd2596f09a60ebffadb6fc1c557f7a601885d6d911763555dd6e90a024a3847c6b03a0356201c62258ab4c14795450a2b1bb4de24c43b1c8730d637e04117921d39e2415c5bbe0c3530ed20ea9148e2892dd632276c47d73fd8f0dd3c4dccc3302e09e8c38f0d728aed4572eeed2c63e78bd3d599e36e643857225917e00a9025be42244e811fdf", 0xdb, r6) 07:58:12 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:12 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:12 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x5) 07:58:12 executing program 5: mount_setattr(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) 07:58:12 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:12 executing program 4: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) keyctl$chown(0x4, r3, r4, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r5 = request_key(&(0x7f00000014c0)='.request_key_auth\x00', &(0x7f0000001500)={'syz', 0x3}, &(0x7f0000001540)='\x00', 0xfffffffffffffffb) socket$l2tp(0x2, 0x2, 0x73) add_key$keyring(&(0x7f0000001440), &(0x7f0000001480)={'syz', 0x0}, 0x0, 0x0, r5) r6 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r6) 07:58:12 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:12 executing program 1: socket(0x23, 0x0, 0x9) 07:58:12 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x5) 07:58:12 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x20c641, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x5) 07:58:12 executing program 4: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) keyctl$chown(0x4, r3, r4, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r5 = request_key(&(0x7f00000014c0)='.request_key_auth\x00', &(0x7f0000001500)={'syz', 0x3}, &(0x7f0000001540)='\x00', 0xfffffffffffffffb) socket$l2tp(0x2, 0x2, 0x73) add_key$keyring(&(0x7f0000001440), &(0x7f0000001480)={'syz', 0x0}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 07:58:12 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:12 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:12 executing program 5: mount_setattr(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) 07:58:12 executing program 1: socket(0x23, 0x0, 0x0) 07:58:12 executing program 5: mount_setattr(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000240)={0x0, 0x70}, 0x20) 07:58:12 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:12 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x20c641, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x5) 07:58:12 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:12 executing program 1: socket(0x23, 0x0, 0x0) 07:58:12 executing program 4: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) keyctl$chown(0x4, r3, r4, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r5 = request_key(&(0x7f00000014c0)='.request_key_auth\x00', &(0x7f0000001500)={'syz', 0x3}, &(0x7f0000001540)='\x00', 0xfffffffffffffffb) socket$l2tp(0x2, 0x2, 0x73) add_key$keyring(&(0x7f0000001440), &(0x7f0000001480)={'syz', 0x0}, 0x0, 0x0, r5) 07:58:12 executing program 5: mount_setattr(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000240)={0x0, 0x70}, 0x20) 07:58:12 executing program 1: socket(0x23, 0x0, 0x0) 07:58:12 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:12 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x20c641, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x5) 07:58:12 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:12 executing program 4: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) keyctl$chown(0x4, r3, r4, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) request_key(&(0x7f00000014c0)='.request_key_auth\x00', &(0x7f0000001500)={'syz', 0x3}, &(0x7f0000001540)='\x00', 0xfffffffffffffffb) socket$l2tp(0x2, 0x2, 0x73) 07:58:12 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c0"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:12 executing program 5: mount_setattr(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000240)={0x0, 0x70}, 0x20) 07:58:12 executing program 1: socket(0x23, 0x0, 0x0) 07:58:12 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c000"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:12 executing program 4: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) keyctl$chown(0x4, r3, r4, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 07:58:12 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x20c641, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x5) 07:58:12 executing program 5: mount_setattr(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000240)={0x80}, 0x20) 07:58:12 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:12 executing program 1: socket(0x23, 0x0, 0x0) 07:58:12 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c0"], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:12 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x5) 07:58:12 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:12 executing program 4: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) keyctl$chown(0x4, r3, r4, 0x0) socket$l2tp(0x2, 0x2, 0x73) 07:58:12 executing program 5: mount_setattr(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000240)={0x80}, 0x20) 07:58:12 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x5) 07:58:12 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:12 executing program 1: socket(0x23, 0x0, 0x0) 07:58:12 executing program 4: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) socket$l2tp(0x2, 0x2, 0x73) 07:58:12 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:12 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:12 executing program 5: mount_setattr(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000240)={0x80}, 0x20) 07:58:12 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x5) 07:58:12 executing program 1: socket(0x0, 0x0, 0x0) 07:58:12 executing program 4: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) socket$l2tp(0x2, 0x2, 0x73) 07:58:12 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c0"], 0xc0}}, 0x0) 07:58:12 executing program 5: mount_setattr(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000240)={0x80}, 0x20) 07:58:12 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xc0}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) 07:58:12 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x5) 07:58:12 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x5) 07:58:12 executing program 1: socket(0x0, 0x0, 0x0) 07:58:12 executing program 4: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) socket$l2tp(0x2, 0x2, 0x73) 07:58:12 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="c0"], 0xc0}}, 0x0) 07:58:12 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) renameat2(r0, 0x0, r0, &(0x7f0000000100)='./file0\x00', 0x5) 07:58:12 executing program 5: mount_setattr(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000240)={0x80}, 0x20) 07:58:12 executing program 1: socket(0x0, 0x0, 0x0) 07:58:12 executing program 4: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) socket$l2tp(0x2, 0x2, 0x73) 07:58:12 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x5) 07:58:12 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) renameat2(r0, 0x0, r0, &(0x7f0000000100)='./file0\x00', 0x5) 07:58:12 executing program 5: mount_setattr(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000240)={0x80}, 0x20) 07:58:12 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) renameat2(r0, 0x0, r0, &(0x7f0000000100)='./file0\x00', 0x5) 07:58:12 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) keyctl$chown(0x4, r3, r4, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r5 = request_key(&(0x7f00000014c0)='.request_key_auth\x00', &(0x7f0000001500)={'syz', 0x3}, &(0x7f0000001540)='\x00', 0xfffffffffffffffb) socket$l2tp(0x2, 0x2, 0x73) add_key$keyring(&(0x7f0000001440), &(0x7f0000001480)={'syz', 0x0}, 0x0, 0x0, r5) r6 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r6) add_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="d2ab1e3e108b9c7e27f1c0b8b147dbd49a5296b2a5baeba2b73391425f0e89c5476b9e7e45f5e2eea827d4c277c8867283396f1b8422f731d8773368823db2a0a089ecea782e9ed5bd9d9c1042454c9bc5e0fa9bd2596f09a60ebffadb6fc1c557f7a601885d6d911763555dd6e90a024a3847c6b03a0356201c62258ab4c14795450a2b1bb4de24c43b1c8730d637e04117921d39e2415c5bbe0c3530ed20ea9148e2892dd632276c47d73fd8f0dd3c4dccc3302e09e8c38f0d728aed4572eeed2c63e78bd3d599e36e643857225917e00a9025be42244e811fdf", 0xdb, r6) 07:58:12 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) renameat2(r0, 0x0, r0, &(0x7f0000000100)='./file0\x00', 0x5) 07:58:12 executing program 5: mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000240)={0x80}, 0x20) 07:58:12 executing program 4: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) socket$l2tp(0x2, 0x2, 0x73) 07:58:12 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x5) 07:58:12 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) renameat2(r0, 0x0, r0, &(0x7f0000000100)='./file0\x00', 0x5) 07:58:12 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) keyctl$chown(0x4, r3, r4, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r5 = request_key(&(0x7f00000014c0)='.request_key_auth\x00', &(0x7f0000001500)={'syz', 0x3}, &(0x7f0000001540)='\x00', 0xfffffffffffffffb) socket$l2tp(0x2, 0x2, 0x73) add_key$keyring(&(0x7f0000001440), &(0x7f0000001480)={'syz', 0x0}, 0x0, 0x0, r5) r6 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r6) add_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="d2ab1e3e108b9c7e27f1c0b8b147dbd49a5296b2a5baeba2b73391425f0e89c5476b9e7e45f5e2eea827d4c277c8867283396f1b8422f731d8773368823db2a0a089ecea782e9ed5bd9d9c1042454c9bc5e0fa9bd2596f09a60ebffadb6fc1c557f7a601885d6d911763555dd6e90a024a3847c6b03a0356201c62258ab4c14795450a2b1bb4de24c43b1c8730d637e04117921d39e2415c5bbe0c3530ed20ea9148e2892dd632276c47d73fd8f0dd3c4dccc3302e09e8c38f0d728aed4572eeed2c63e78bd3d599e36e643857225917e00a9025be42244e811fdf", 0xdb, r6) 07:58:12 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x5) 07:58:12 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) renameat2(r0, 0x0, r0, &(0x7f0000000100)='./file0\x00', 0x5) 07:58:12 executing program 0: renameat2(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x5) 07:58:12 executing program 4: add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r0) socket$l2tp(0x2, 0x2, 0x73) 07:58:12 executing program 5: mount_setattr(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 07:58:12 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) keyctl$chown(0x4, r3, r4, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r5 = request_key(&(0x7f00000014c0)='.request_key_auth\x00', &(0x7f0000001500)={'syz', 0x3}, &(0x7f0000001540)='\x00', 0xfffffffffffffffb) socket$l2tp(0x2, 0x2, 0x73) add_key$keyring(&(0x7f0000001440), &(0x7f0000001480)={'syz', 0x0}, 0x0, 0x0, r5) r6 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r6) add_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="d2ab1e3e108b9c7e27f1c0b8b147dbd49a5296b2a5baeba2b73391425f0e89c5476b9e7e45f5e2eea827d4c277c8867283396f1b8422f731d8773368823db2a0a089ecea782e9ed5bd9d9c1042454c9bc5e0fa9bd2596f09a60ebffadb6fc1c557f7a601885d6d911763555dd6e90a024a3847c6b03a0356201c62258ab4c14795450a2b1bb4de24c43b1c8730d637e04117921d39e2415c5bbe0c3530ed20ea9148e2892dd632276c47d73fd8f0dd3c4dccc3302e09e8c38f0d728aed4572eeed2c63e78bd3d599e36e643857225917e00a9025be42244e811fdf", 0xdb, r6) 07:58:12 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x5) 07:58:12 executing program 0: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x5) 07:58:12 executing program 3: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x5) 07:58:12 executing program 4: add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) socket$l2tp(0x2, 0x2, 0x73) 07:58:12 executing program 5: mount_setattr(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 07:58:12 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x5) 07:58:12 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) keyctl$chown(0x4, r3, r4, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r5 = request_key(&(0x7f00000014c0)='.request_key_auth\x00', &(0x7f0000001500)={'syz', 0x3}, &(0x7f0000001540)='\x00', 0xfffffffffffffffb) socket$l2tp(0x2, 0x2, 0x73) add_key$keyring(&(0x7f0000001440), &(0x7f0000001480)={'syz', 0x0}, 0x0, 0x0, r5) r6 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r6) 07:58:12 executing program 3: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x5) 07:58:12 executing program 5: mount_setattr(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 07:58:12 executing program 0: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x5) 07:58:12 executing program 4: add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) socket$l2tp(0x2, 0x2, 0x73) 07:58:12 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) keyctl$chown(0x4, r3, r4, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r5 = request_key(&(0x7f00000014c0)='.request_key_auth\x00', &(0x7f0000001500)={'syz', 0x3}, &(0x7f0000001540)='\x00', 0xfffffffffffffffb) socket$l2tp(0x2, 0x2, 0x73) add_key$keyring(&(0x7f0000001440), &(0x7f0000001480)={'syz', 0x0}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 07:58:12 executing program 3: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x5) 07:58:12 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x5) 07:58:12 executing program 0: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x5) 07:58:12 executing program 4: socket$l2tp(0x2, 0x2, 0x73) 07:58:12 executing program 5: mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000240), 0x20) 07:58:12 executing program 4: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x5) 07:58:12 executing program 0: renameat2(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x5) 07:58:12 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) 07:58:12 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) keyctl$chown(0x4, r3, r4, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r5 = request_key(&(0x7f00000014c0)='.request_key_auth\x00', &(0x7f0000001500)={'syz', 0x3}, &(0x7f0000001540)='\x00', 0xfffffffffffffffb) socket$l2tp(0x2, 0x2, 0x73) add_key$keyring(&(0x7f0000001440), &(0x7f0000001480)={'syz', 0x0}, 0x0, 0x0, r5) 07:58:12 executing program 5: mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000240), 0x20) 07:58:12 executing program 3: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x5) 07:58:12 executing program 0: renameat2(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x5) 07:58:12 executing program 2: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) keyctl$chown(0x4, r3, r4, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r5 = request_key(&(0x7f00000014c0)='.request_key_auth\x00', &(0x7f0000001500)={'syz', 0x3}, &(0x7f0000001540)='\x00', 0xfffffffffffffffb) socket$l2tp(0x2, 0x2, 0x73) add_key$keyring(&(0x7f0000001440), &(0x7f0000001480)={'syz', 0x0}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 07:58:12 executing program 4: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x5) 07:58:12 executing program 3: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) 07:58:12 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) keyctl$chown(0x4, r3, r4, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) request_key(&(0x7f00000014c0)='.request_key_auth\x00', &(0x7f0000001500)={'syz', 0x3}, &(0x7f0000001540)='\x00', 0xfffffffffffffffb) socket$l2tp(0x2, 0x2, 0x73) 07:58:12 executing program 5: mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000240), 0x20) 07:58:12 executing program 0: renameat2(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x5) 07:58:12 executing program 4: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x5) 07:58:12 executing program 2: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) keyctl$chown(0x4, r3, r4, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r5 = request_key(&(0x7f00000014c0)='.request_key_auth\x00', &(0x7f0000001500)={'syz', 0x3}, &(0x7f0000001540)='\x00', 0xfffffffffffffffb) socket$l2tp(0x2, 0x2, 0x73) add_key$keyring(&(0x7f0000001440), &(0x7f0000001480)={'syz', 0x0}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 07:58:12 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) keyctl$chown(0x4, r3, r4, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) request_key(&(0x7f00000014c0)='.request_key_auth\x00', &(0x7f0000001500)={'syz', 0x3}, &(0x7f0000001540)='\x00', 0xfffffffffffffffb) 07:58:12 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x5) 07:58:12 executing program 4: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) 07:58:12 executing program 5: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) keyctl$chown(0x4, r3, r4, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r5 = request_key(&(0x7f00000014c0)='.request_key_auth\x00', &(0x7f0000001500)={'syz', 0x3}, &(0x7f0000001540)='\x00', 0xfffffffffffffffb) socket$l2tp(0x2, 0x2, 0x73) add_key$keyring(&(0x7f0000001440), &(0x7f0000001480)={'syz', 0x0}, 0x0, 0x0, r5) r6 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r6) add_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="d2ab1e3e108b9c7e27f1c0b8b147dbd49a5296b2a5baeba2b73391425f0e89c5476b9e7e45f5e2eea827d4c277c8867283396f1b8422f731d8773368823db2a0a089ecea782e9ed5bd9d9c1042454c9bc5e0fa9bd2596f09a60ebffadb6fc1c557f7a601885d6d911763555dd6e90a024a3847c6b03a0356201c62258ab4c14795450a2b1bb4de24c43b1c8730d637e04117921d39e2415c5bbe0c3530ed20ea9148e2892dd632276c47d73fd8f0dd3c4dccc3302e09e8c38f0d728aed4572eeed2c63e78bd3d599e36e643857225917e00a9025be42244e811fdf", 0xdb, r6) 07:58:12 executing program 0: renameat2(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) 07:58:12 executing program 2: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) keyctl$chown(0x4, r3, r4, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r5 = request_key(&(0x7f00000014c0)='.request_key_auth\x00', &(0x7f0000001500)={'syz', 0x3}, &(0x7f0000001540)='\x00', 0xfffffffffffffffb) socket$l2tp(0x2, 0x2, 0x73) add_key$keyring(&(0x7f0000001440), &(0x7f0000001480)={'syz', 0x0}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 07:58:12 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x5) 07:58:12 executing program 4: connect$l2tp(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, 0x10) r0 = socket(0x1d, 0x2, 0x401) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="04002abd7000ffdbdf250600000005001300040068a10595714a08988956460000050004000600000006001d00ff07000006001c00470000000c000f00030000000000000014001f00ff01000000"], 0x54}, 0x1, 0x0, 0x0, 0x20000004}, 0x40) 07:58:12 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) keyctl$chown(0x4, r3, r4, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) 07:58:12 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x2, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, 0x0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r7 = socket(0x1a, 0x800, 0x1) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000240)=0x63, 0x2) r8 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, 0x0) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xcc, 0x0, 0x200, 0x70bd29, 0x25dfdbff, {}, [@NBD_ATTR_SOCKETS={0x2c, 0x7, 0x0, 0x1, [{0x8}, {0x8}, {0x8, 0x1, r1}, {0x8}, {0x8, 0x1, r2}]}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x51249e9d}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6}, @NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xff}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x7ff}, @NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r3}, {0x8}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8}, {0x8, 0x1, r7}, {0x8, 0x1, r8}]}]}, 0xcc}}, 0x20004000) 07:58:12 executing program 0: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x7, 0x7f, 0x2, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) 07:58:12 executing program 2: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) keyctl$chown(0x4, r3, r4, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r5 = request_key(&(0x7f00000014c0)='.request_key_auth\x00', &(0x7f0000001500)={'syz', 0x3}, &(0x7f0000001540)='\x00', 0xfffffffffffffffb) socket$l2tp(0x2, 0x2, 0x73) add_key$keyring(&(0x7f0000001440), &(0x7f0000001480)={'syz', 0x0}, 0x0, 0x0, r5) 07:58:13 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x5) 07:58:13 executing program 4: connect$l2tp(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, 0x10) r0 = socket(0x1d, 0x2, 0x401) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="04002abd7000ffdbdf250600000005001300040068a10595714a08988956460000050004000600000006001d00ff07000006001c00470000000c000f00030000000000000014001f00ff01000000"], 0x54}, 0x1, 0x0, 0x0, 0x20000004}, 0x40) 07:58:13 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) keyctl$chown(0x4, r3, r4, 0x0) 07:58:13 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x2, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, 0x0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r7 = socket(0x1a, 0x800, 0x1) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000240)=0x63, 0x2) r8 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, 0x0) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xcc, 0x0, 0x200, 0x70bd29, 0x25dfdbff, {}, [@NBD_ATTR_SOCKETS={0x2c, 0x7, 0x0, 0x1, [{0x8}, {0x8}, {0x8, 0x1, r1}, {0x8}, {0x8, 0x1, r2}]}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x51249e9d}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6}, @NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xff}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x7ff}, @NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r3}, {0x8}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8}, {0x8, 0x1, r7}, {0x8, 0x1, r8}]}]}, 0xcc}}, 0x20004000) 07:58:13 executing program 0: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x7, 0x7f, 0x2, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) 07:58:13 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) 07:58:13 executing program 3: renameat2(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x5) 07:58:13 executing program 4: connect$l2tp(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, 0x10) r0 = socket(0x1d, 0x2, 0x401) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="04002abd7000ffdbdf250600000005001300040068a10595714a08988956460000050004000600000006001d00ff07000006001c00470000000c000f00030000000000000014001f00ff01000000"], 0x54}, 0x1, 0x0, 0x0, 0x20000004}, 0x40) 07:58:13 executing program 2: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) keyctl$chown(0x4, r3, r4, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) request_key(&(0x7f00000014c0)='.request_key_auth\x00', &(0x7f0000001500)={'syz', 0x3}, &(0x7f0000001540)='\x00', 0xfffffffffffffffb) socket$l2tp(0x2, 0x2, 0x73) 07:58:13 executing program 0: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x7, 0x7f, 0x2, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) 07:58:13 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x2, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, 0x0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r7 = socket(0x1a, 0x800, 0x1) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000240)=0x63, 0x2) r8 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, 0x0) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xcc, 0x0, 0x200, 0x70bd29, 0x25dfdbff, {}, [@NBD_ATTR_SOCKETS={0x2c, 0x7, 0x0, 0x1, [{0x8}, {0x8}, {0x8, 0x1, r1}, {0x8}, {0x8, 0x1, r2}]}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x51249e9d}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6}, @NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xff}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x7ff}, @NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r3}, {0x8}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8}, {0x8, 0x1, r7}, {0x8, 0x1, r8}]}]}, 0xcc}}, 0x20004000) 07:58:13 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) 07:58:13 executing program 3: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x5) 07:58:13 executing program 4: connect$l2tp(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, 0x10) socket(0x1d, 0x2, 0x401) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) 07:58:13 executing program 0: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x7, 0x7f, 0x2, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) 07:58:13 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x2, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) socket(0x1a, 0x800, 0x1) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000240)=0x63, 0x2) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, 0x0) 07:58:13 executing program 3: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x5) 07:58:13 executing program 2: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) keyctl$chown(0x4, r3, r4, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) request_key(&(0x7f00000014c0)='.request_key_auth\x00', &(0x7f0000001500)={'syz', 0x3}, &(0x7f0000001540)='\x00', 0xfffffffffffffffb) 07:58:13 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) 07:58:13 executing program 4: connect$l2tp(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, 0x10) socket(0x1d, 0x2, 0x401) 07:58:13 executing program 3: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x5) 07:58:13 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x7, 0x7f, 0x2, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) 07:58:13 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x2, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) socket(0x1a, 0x800, 0x1) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000240)=0x63, 0x2) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) 07:58:13 executing program 2: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) keyctl$chown(0x4, r3, r4, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) 07:58:13 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) 07:58:13 executing program 4: socket(0x1d, 0x2, 0x401) 07:58:13 executing program 3: renameat2(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) 07:58:13 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x2, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) socket(0x1a, 0x800, 0x1) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000240)=0x63, 0x2) 07:58:13 executing program 2: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) keyctl$chown(0x4, r3, r4, 0x0) 07:58:13 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) 07:58:13 executing program 4: socket(0x0, 0x2, 0x401) 07:58:13 executing program 1: add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) 07:58:13 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) 07:58:13 executing program 2: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) 07:58:13 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) keyctl$chown(0x4, r3, r4, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) 07:58:13 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x2, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) socket(0x1a, 0x800, 0x1) 07:58:13 executing program 1: add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) 07:58:13 executing program 4: socket(0x0, 0x2, 0x401) 07:58:13 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) 07:58:13 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) keyctl$chown(0x4, r3, r4, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) 07:58:13 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x7f, 0x2, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) 07:58:13 executing program 2: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) 07:58:13 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x2, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, 0x0) socket(0x1a, 0x800, 0x1) 07:58:13 executing program 1: add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) 07:58:13 executing program 1: request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) 07:58:13 executing program 4: socket(0x0, 0x2, 0x401) 07:58:13 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) 07:58:13 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) keyctl$chown(0x4, r3, r4, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) 07:58:13 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x2, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) socket(0x1a, 0x800, 0x1) 07:58:13 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) 07:58:13 executing program 2: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) 07:58:13 executing program 4: socket(0x1d, 0x0, 0x401) 07:58:13 executing program 1: request_key(0x0, &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) 07:58:13 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) keyctl$chown(0x4, r3, r4, 0x0) 07:58:13 executing program 4: socket(0x1d, 0x0, 0x0) 07:58:13 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x2, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) socket(0x1a, 0x800, 0x1) 07:58:13 executing program 2: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) 07:58:13 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) 07:58:13 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) 07:58:13 executing program 1: request_key(0x0, &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) 07:58:13 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x2, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) socket(0x1a, 0x800, 0x1) 07:58:13 executing program 2: add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) 07:58:13 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) 07:58:13 executing program 4: socket(0x1d, 0x0, 0x0) 07:58:13 executing program 2: add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) 07:58:13 executing program 1: request_key(0x0, &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) 07:58:13 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) [ 285.911117][T11728] can: request_module (can-proto-0) failed. 07:58:13 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) 07:58:13 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x2, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) socket(0x1a, 0x800, 0x1) 07:58:13 executing program 1: request_key(&(0x7f0000001380)='keyring\x00', 0x0, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) 07:58:13 executing program 2: add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) 07:58:13 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) 07:58:13 executing program 4: socket(0x1d, 0x0, 0x0) 07:58:13 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x48) 07:58:13 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x2, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) socket(0x1a, 0x800, 0x1) 07:58:13 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) keyctl$invalidate(0x15, r0) 07:58:13 executing program 2: request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) 07:58:13 executing program 1: request_key(&(0x7f0000001380)='keyring\x00', 0x0, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) [ 285.989860][T11746] can: request_module (can-proto-0) failed. 07:58:13 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x65, 0x38, 0x56, 0x30, 0x30, 0x39, 0x37, 0x31, 0x62, 0x33, 0x38, 0x34, 0x1b]}, &(0x7f0000000200)={0x0, "ba6926038be36f01cf6c2b98e7f5b913509e0d4933796a7d18b52fcdbb50ffd5d5b4978c9d9505ffa8bd82e19efb528567155665be60c5e8ec8c1353f27db627", 0x2d}, 0x48, r2) 07:58:13 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x48) 07:58:13 executing program 1: request_key(&(0x7f0000001380)='keyring\x00', 0x0, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) 07:58:13 executing program 4: socket(0x1d, 0x0, 0x0) 07:58:13 executing program 2: request_key(0x0, &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) 07:58:13 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x2, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) socket(0x1a, 0x800, 0x1) 07:58:13 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) [ 286.060655][T11763] can: request_module (can-proto-0) failed. 07:58:13 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x48) 07:58:13 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:13 executing program 2: request_key(0x0, &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) 07:58:13 executing program 1: request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, 0x0, 0xfffffffffffffffc) 07:58:13 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x2, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socket(0x1a, 0x800, 0x1) 07:58:13 executing program 4: socket(0x1d, 0x0, 0x0) 07:58:13 executing program 0: request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) 07:58:13 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) [ 286.125424][T11782] can: request_module (can-proto-0) failed. 07:58:13 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x2, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) socket(0x1a, 0x800, 0x1) 07:58:13 executing program 1: request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, 0x0, 0xfffffffffffffffc) 07:58:13 executing program 2: request_key(0x0, &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) 07:58:13 executing program 0: request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) 07:58:13 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x2, 0x0) socket(0x1a, 0x800, 0x1) 07:58:13 executing program 2: request_key(&(0x7f0000001380)='keyring\x00', 0x0, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) 07:58:13 executing program 1: request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, 0x0, 0xfffffffffffffffc) 07:58:13 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:13 executing program 4: socket(0x1d, 0x0, 0x0) 07:58:13 executing program 0: request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) [ 286.214758][T11806] can: request_module (can-proto-0) failed. 07:58:13 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:13 executing program 2: request_key(&(0x7f0000001380)='keyring\x00', 0x0, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) 07:58:13 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:13 executing program 5: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socket(0x1a, 0x800, 0x1) 07:58:13 executing program 0: request_key(0x0, &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) 07:58:13 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:13 executing program 2: request_key(&(0x7f0000001380)='keyring\x00', 0x0, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) 07:58:13 executing program 3: add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, 0x0) 07:58:13 executing program 5: socket(0x1a, 0x800, 0x1) 07:58:13 executing program 0: request_key(0x0, &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) 07:58:13 executing program 4: socket(0x0, 0x0, 0x0) 07:58:13 executing program 2: request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, 0x0, 0xfffffffffffffffc) 07:58:13 executing program 5: socket(0x0, 0x800, 0x1) [ 286.317070][T11827] can: request_module (can-proto-0) failed. 07:58:13 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:13 executing program 0: request_key(0x0, &(0x7f00000013c0)={'syz', 0x2}, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) 07:58:13 executing program 3: add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, 0x0) 07:58:13 executing program 4: socket(0x0, 0x0, 0x0) 07:58:13 executing program 0: request_key(&(0x7f0000001380)='keyring\x00', 0x0, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) 07:58:13 executing program 2: request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, 0x0, 0xfffffffffffffffc) 07:58:13 executing program 1: add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, 0x0) 07:58:14 executing program 5: socket(0x0, 0x800, 0x1) 07:58:14 executing program 3: add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, 0x0) 07:58:14 executing program 0: request_key(&(0x7f0000001380)='keyring\x00', 0x0, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) 07:58:14 executing program 1: add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, 0x0) 07:58:14 executing program 1: add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, 0x0) 07:58:14 executing program 4: socket(0x0, 0x0, 0x0) 07:58:14 executing program 2: request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, 0x0, 0xfffffffffffffffc) 07:58:14 executing program 5: socket(0x0, 0x800, 0x1) 07:58:14 executing program 3: r0 = add_key$keyring(0x0, &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:14 executing program 0: request_key(&(0x7f0000001380)='keyring\x00', 0x0, &(0x7f0000001400)='\x00', 0xfffffffffffffffc) 07:58:14 executing program 2: request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, 0x0, 0xfffffffffffffffc) 07:58:14 executing program 1: r0 = add_key$keyring(0x0, &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:14 executing program 0: request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, 0x0, 0xfffffffffffffffc) 07:58:14 executing program 3: r0 = add_key$keyring(0x0, &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:14 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x2, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, 0x0) socket(0x1a, 0x800, 0x1) 07:58:14 executing program 5: socket(0x1a, 0x0, 0x1) 07:58:14 executing program 2: request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, 0x0, 0xfffffffffffffffc) 07:58:14 executing program 1: r0 = add_key$keyring(0x0, &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:14 executing program 0: request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, 0x0, 0xfffffffffffffffc) 07:58:14 executing program 5: socket(0x1a, 0x0, 0x0) 07:58:14 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x2800, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0xfffffff8, 0x5, 0x7fffffff, 0x80, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0xb}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}]}, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r1, 0x1, r2, r3, 0x1]}, 0x80) r4 = socket(0x10, 0x6, 0x7fffffff) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) getsockopt$inet6_udp_int(r5, 0x11, 0x66, &(0x7f0000000640), &(0x7f0000000680)=0x4) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x208002, 0x0) timer_create(0x3, &(0x7f0000000180)={0x0, 0xa, 0x1, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) timer_delete(r7) ioctl$USBDEVFS_GET_CAPABILITIES(0xffffffffffffffff, 0x8004551a, &(0x7f0000000740)) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x8, 0x20, 0x8, 0x164, r5, 0x7f29a52d, '\x00', 0x0, r6, 0x4, 0x3, 0x2, 0xf}, 0x48) openat$vcsa(0xffffffffffffff9c, &(0x7f00000006c0), 0x14082, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r4, 0x112, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000540)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_START_P2P_DEVICE(r6, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022bbd7000fddbdf2559000000080003004fc96e9efe31216331dadfd421cb317e45c47a86ca0451eb7a3a9e6fb77f5249501437ba5666432e1822562a8ad88f8f89dbcaad953268a8699741b6627c0da5c92866d4dede480913c2e77bcfe05989c2905497e465efd89f4e6de5e24e2ef1fc48a9afaf26385eea9cef5dbc57d71630935e6b72d7fd448aada3f1", @ANYRES32=r8, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0xd13feb0c5245a8c) 07:58:14 executing program 0: request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, 0x0, 0xfffffffffffffffc) 07:58:14 executing program 2: request_key(&(0x7f0000001380)='keyring\x00', &(0x7f00000013c0)={'syz', 0x2}, 0x0, 0xfffffffffffffffc) 07:58:14 executing program 3: r0 = add_key$keyring(0x0, &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:14 executing program 1: r0 = add_key$keyring(0x0, &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:14 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x2800, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0xfffffff8, 0x5, 0x7fffffff, 0x80, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0xb}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}]}, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r1, 0x1, r2, r3, 0x1]}, 0x80) r4 = socket(0x10, 0x6, 0x7fffffff) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) getsockopt$inet6_udp_int(r5, 0x11, 0x66, &(0x7f0000000640), &(0x7f0000000680)=0x4) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x208002, 0x0) timer_create(0x3, &(0x7f0000000180)={0x0, 0xa, 0x1, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) timer_delete(r7) ioctl$USBDEVFS_GET_CAPABILITIES(0xffffffffffffffff, 0x8004551a, &(0x7f0000000740)) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x8, 0x20, 0x8, 0x164, r5, 0x7f29a52d, '\x00', 0x0, r6, 0x4, 0x3, 0x2, 0xf}, 0x48) openat$vcsa(0xffffffffffffff9c, &(0x7f00000006c0), 0x14082, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r4, 0x112, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000540)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_START_P2P_DEVICE(r6, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022bbd7000fddbdf2559000000080003004fc96e9efe31216331dadfd421cb317e45c47a86ca0451eb7a3a9e6fb77f5249501437ba5666432e1822562a8ad88f8f89dbcaad953268a8699741b6627c0da5c92866d4dede480913c2e77bcfe05989c2905497e465efd89f4e6de5e24e2ef1fc48a9afaf26385eea9cef5dbc57d71630935e6b72d7fd448aada3f1", @ANYRES32=r8, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0xd13feb0c5245a8c) 07:58:14 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x2800, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0xfffffff8, 0x5, 0x7fffffff, 0x80, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0xb}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}]}, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r1, 0x1, r2, r3, 0x1]}, 0x80) r4 = socket(0x10, 0x6, 0x7fffffff) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) getsockopt$inet6_udp_int(r5, 0x11, 0x66, &(0x7f0000000640), &(0x7f0000000680)=0x4) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x208002, 0x0) timer_create(0x3, &(0x7f0000000180)={0x0, 0xa, 0x1, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) timer_delete(r7) ioctl$USBDEVFS_GET_CAPABILITIES(0xffffffffffffffff, 0x8004551a, &(0x7f0000000740)) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x8, 0x20, 0x8, 0x164, r5, 0x7f29a52d, '\x00', 0x0, r6, 0x4, 0x3, 0x2, 0xf}, 0x48) openat$vcsa(0xffffffffffffff9c, &(0x7f00000006c0), 0x14082, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r4, 0x112, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000540)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_START_P2P_DEVICE(r6, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022bbd7000fddbdf2559000000080003004fc96e9efe31216331dadfd421cb317e45c47a86ca0451eb7a3a9e6fb77f5249501437ba5666432e1822562a8ad88f8f89dbcaad953268a8699741b6627c0da5c92866d4dede480913c2e77bcfe05989c2905497e465efd89f4e6de5e24e2ef1fc48a9afaf26385eea9cef5dbc57d71630935e6b72d7fd448aada3f1", @ANYRES32=r8, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0xd13feb0c5245a8c) 07:58:14 executing program 2: request_key(0x0, &(0x7f00000013c0)={'syz', 0x2}, 0x0, 0xfffffffffffffffc) 07:58:14 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="b44c9cd89c1d2899e7f851544fb788c4ba79c16ceb58e843b0936ad2d3a3", 0x1e, 0x0) r1 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000200)=[{&(0x7f0000000f80)="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", 0x1000}, {&(0x7f00000000c0)="1196464113d14f1d54a4092b3986a61a0fc19a9f042bcc102fcdca05390ab5507f70c9418118", 0x26}, {&(0x7f0000000100)="fb209207e9ca4608b112da8a6da98cdd1f6c343322afb7d2c85325a8fcf78e7fb1c17b061bf1800469b96f0e87def6833fb0c28549af869ad2b34a89d1d61285dfee1a300a58cd064319b162e240493ab5b2abc6986c07f3f711ad9f49c57bbad63dbfcd4872c8545b8b03530b3f86cccd36e440c4881a0275599c9e17877b537f95eaba65d0e1ca0d0b6b8493a9cb93918033c0818c83aefcf70aa99f385154900e15f85046890dba4bd4338c04f3de54fcc3ab614cebf5c807e5cc59746859f3c3ab52fb04b620b911a8d4d53b", 0xce}], 0x3, r1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:58:14 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:14 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:14 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x2800, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0xfffffff8, 0x5, 0x7fffffff, 0x80, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0xb}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}]}, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r1, 0x1, r2, r3, 0x1]}, 0x80) r4 = socket(0x10, 0x6, 0x7fffffff) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) getsockopt$inet6_udp_int(r5, 0x11, 0x66, &(0x7f0000000640), &(0x7f0000000680)=0x4) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x208002, 0x0) timer_create(0x3, &(0x7f0000000180)={0x0, 0xa, 0x1, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) timer_delete(r7) ioctl$USBDEVFS_GET_CAPABILITIES(0xffffffffffffffff, 0x8004551a, &(0x7f0000000740)) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x8, 0x20, 0x8, 0x164, r5, 0x7f29a52d, '\x00', 0x0, r6, 0x4, 0x3, 0x2, 0xf}, 0x48) openat$vcsa(0xffffffffffffff9c, &(0x7f00000006c0), 0x14082, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r4, 0x112, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000540)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_START_P2P_DEVICE(r6, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022bbd7000fddbdf2559000000080003004fc96e9efe31216331dadfd421cb317e45c47a86ca0451eb7a3a9e6fb77f5249501437ba5666432e1822562a8ad88f8f89dbcaad953268a8699741b6627c0da5c92866d4dede480913c2e77bcfe05989c2905497e465efd89f4e6de5e24e2ef1fc48a9afaf26385eea9cef5dbc57d71630935e6b72d7fd448aada3f1", @ANYRES32=r8, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0xd13feb0c5245a8c) 07:58:14 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x2800, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0xfffffff8, 0x5, 0x7fffffff, 0x80, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0xb}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}]}, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r1, 0x1, r2, r3, 0x1]}, 0x80) r4 = socket(0x10, 0x6, 0x7fffffff) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) getsockopt$inet6_udp_int(r5, 0x11, 0x66, &(0x7f0000000640), &(0x7f0000000680)=0x4) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x208002, 0x0) timer_create(0x3, &(0x7f0000000180)={0x0, 0xa, 0x1, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) timer_delete(r7) ioctl$USBDEVFS_GET_CAPABILITIES(0xffffffffffffffff, 0x8004551a, &(0x7f0000000740)) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x8, 0x20, 0x8, 0x164, r5, 0x7f29a52d, '\x00', 0x0, r6, 0x4, 0x3, 0x2, 0xf}, 0x48) openat$vcsa(0xffffffffffffff9c, &(0x7f00000006c0), 0x14082, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r4, 0x112, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000540)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_START_P2P_DEVICE(r6, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022bbd7000fddbdf2559000000080003004fc96e9efe31216331dadfd421cb317e45c47a86ca0451eb7a3a9e6fb77f5249501437ba5666432e1822562a8ad88f8f89dbcaad953268a8699741b6627c0da5c92866d4dede480913c2e77bcfe05989c2905497e465efd89f4e6de5e24e2ef1fc48a9afaf26385eea9cef5dbc57d71630935e6b72d7fd448aada3f1", @ANYRES32=r8, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0xd13feb0c5245a8c) 07:58:14 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:14 executing program 0: sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendmsg$AUDIT_USER_TTY(r0, 0x0, 0x800) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000480), &(0x7f00000004c0)=0x1) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_tracing={0x1a, 0xa, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xadc}, [@map_fd, @cb_func={0x18, 0x0, 0x4, 0x0, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4}, @ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x14}]}, &(0x7f0000000580)='GPL\x00', 0x0, 0x69, &(0x7f00000005c0)=""/105, 0x41000, 0x4, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, r1}, 0x80) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) setsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000000)=0x800, 0x2) syz_mount_image$vfat(&(0x7f0000000740), &(0x7f0000000780)='./file0\x00', 0x0, 0x4, &(0x7f0000000a80)=[{&(0x7f00000007c0)="3c1b60ef07fa680a3d2d43a364f8ebc880a5b7583fd7cedb3dfb16962fcbdb33d929b597b65681ec25e44371734e1bb589c7876dc12780b425d077d7af66e340526de2eb7a00961a42c6c381400aafe4f42dcc47ba151733dda5df76011799a98a0825dd70bafaa7c0bcc08e3febbfdb257322458d4672bc43", 0x79, 0x800000}, {&(0x7f0000000840)="33ba9f86d1c10d126ae2466b36", 0xd}, {&(0x7f0000000880)="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", 0xfd, 0x5}, {&(0x7f0000000980)="ece5a5b667da8646233432153d9676ef9e64064fc0b4f28ffc445a7ce93be3e2de906d45cc77c2d3d4ec81e6e13bb2f942e0ce6ff8383282e2937a5f94ac943687a746c7bfd978163dabdba88b5be4480d3795569d5fb209d76a686cdc47a0d53f37396d001171539e0f1fa686078a1d26fa6b15a7b0171845112773399fed5cc490c6c1ac5ed73f8372cf4c600ceaa95d1f2f0eba18211f8d4a7c70f24b233a1969f30555abe6bd8c794f626220a8d0c6", 0xb1, 0x7fff}], 0x80080, &(0x7f0000000b00)={[{@utf8no}, {@shortname_winnt}, {@nonumtail}, {@shortname_win95}, {@utf8no}], [{@pcr}, {@fsname}]}) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000b80), 0x40, 0x0) sendmsg$AUDIT_LIST_RULES(r3, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000c40)={0x0}}, 0x2000c800) sendmsg$AUDIT_SET(r1, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)={0x3c, 0x3e9, 0x0, 0x70bd28, 0x25dfdbfd, {0x0, 0x1, 0x2, 0x0, 0x0, 0x20, 0x1, 0x6, 0x0, 0x1, 0x9}, [""]}, 0x3c}, 0x1, 0x0, 0x0, 0x8010}, 0x14) r4 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x6) 07:58:14 executing program 2: request_key(0x0, &(0x7f00000013c0)={'syz', 0x2}, 0x0, 0xfffffffffffffffc) 07:58:14 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x2800, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0xfffffff8, 0x5, 0x7fffffff, 0x80, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0xb}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}]}, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r1, 0x1, r2, r3, 0x1]}, 0x80) r4 = socket(0x10, 0x6, 0x7fffffff) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) getsockopt$inet6_udp_int(r5, 0x11, 0x66, &(0x7f0000000640), &(0x7f0000000680)=0x4) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x208002, 0x0) timer_create(0x3, &(0x7f0000000180)={0x0, 0xa, 0x1, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) timer_delete(r7) ioctl$USBDEVFS_GET_CAPABILITIES(0xffffffffffffffff, 0x8004551a, &(0x7f0000000740)) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x8, 0x20, 0x8, 0x164, r5, 0x7f29a52d, '\x00', 0x0, r6, 0x4, 0x3, 0x2, 0xf}, 0x48) openat$vcsa(0xffffffffffffff9c, &(0x7f00000006c0), 0x14082, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r4, 0x112, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000540)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_START_P2P_DEVICE(r6, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00022bbd7000fddbdf2559000000080003004fc96e9efe31216331dadfd421cb317e45c47a86ca0451eb7a3a9e6fb77f5249501437ba5666432e1822562a8ad88f8f89dbcaad953268a8699741b6627c0da5c92866d4dede480913c2e77bcfe05989c2905497e465efd89f4e6de5e24e2ef1fc48a9afaf26385eea9cef5dbc57d71630935e6b72d7fd448aada3f1", @ANYRES32=r8, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0xd13feb0c5245a8c) 07:58:14 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:14 executing program 2: request_key(0x0, &(0x7f00000013c0)={'syz', 0x2}, 0x0, 0xfffffffffffffffc) 07:58:14 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x2800, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0xfffffff8, 0x5, 0x7fffffff, 0x80, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0xb}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}]}, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r1, 0x1, r2, r3, 0x1]}, 0x80) r4 = socket(0x10, 0x6, 0x7fffffff) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) getsockopt$inet6_udp_int(r5, 0x11, 0x66, &(0x7f0000000640), &(0x7f0000000680)=0x4) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x208002, 0x0) timer_create(0x3, &(0x7f0000000180)={0x0, 0xa, 0x1, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) timer_delete(r7) ioctl$USBDEVFS_GET_CAPABILITIES(0xffffffffffffffff, 0x8004551a, &(0x7f0000000740)) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x8, 0x20, 0x8, 0x164, r5, 0x7f29a52d, '\x00', 0x0, r6, 0x4, 0x3, 0x2, 0xf}, 0x48) openat$vcsa(0xffffffffffffff9c, &(0x7f00000006c0), 0x14082, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r4, 0x112, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000540)={'wlan0\x00'}) 07:58:14 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:14 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x2800, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0xfffffff8, 0x5, 0x7fffffff, 0x80, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0xb}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}]}, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r1, 0x1, r2, r3, 0x1]}, 0x80) r4 = socket(0x10, 0x6, 0x7fffffff) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) getsockopt$inet6_udp_int(r5, 0x11, 0x66, &(0x7f0000000640), &(0x7f0000000680)=0x4) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x208002, 0x0) timer_create(0x3, &(0x7f0000000180)={0x0, 0xa, 0x1, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) timer_delete(r7) ioctl$USBDEVFS_GET_CAPABILITIES(0xffffffffffffffff, 0x8004551a, &(0x7f0000000740)) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x8, 0x20, 0x8, 0x164, r5, 0x7f29a52d, '\x00', 0x0, r6, 0x4, 0x3, 0x2, 0xf}, 0x48) openat$vcsa(0xffffffffffffff9c, &(0x7f00000006c0), 0x14082, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r4, 0x112, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000540)={'wlan0\x00'}) 07:58:14 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) [ 286.733785][T11945] loop0: detected capacity change from 0 to 32768 07:58:14 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:14 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0xb, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xd7f6}, [@ldst={0x2, 0x0, 0x1, 0x0, 0x2, 0x50, 0x8}, @generic={0x3f, 0xd, 0x9, 0x5, 0x9688}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0xff}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @cb_func={0x18, 0x6, 0x4, 0x0, 0x8}, @exit]}, &(0x7f0000000000)='GPL\x00', 0x184fce6b, 0xba, &(0x7f0000000100)=""/186, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x3, 0x9, 0xffffffff, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000240)=[r0, 0x1]}, 0x80) fsopen(&(0x7f0000000040)='sysfs\x00', 0x1) 07:58:14 executing program 2: request_key(&(0x7f0000001380)='keyring\x00', 0x0, 0x0, 0xfffffffffffffffc) 07:58:14 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x2800, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0xfffffff8, 0x5, 0x7fffffff, 0x80, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0xb}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}]}, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r1, 0x1, r2, r3, 0x1]}, 0x80) r4 = socket(0x10, 0x6, 0x7fffffff) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) getsockopt$inet6_udp_int(r5, 0x11, 0x66, &(0x7f0000000640), &(0x7f0000000680)=0x4) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x208002, 0x0) timer_create(0x3, &(0x7f0000000180)={0x0, 0xa, 0x1, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) timer_delete(r7) ioctl$USBDEVFS_GET_CAPABILITIES(0xffffffffffffffff, 0x8004551a, &(0x7f0000000740)) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x8, 0x20, 0x8, 0x164, r5, 0x7f29a52d, '\x00', 0x0, r6, 0x4, 0x3, 0x2, 0xf}, 0x48) openat$vcsa(0xffffffffffffff9c, &(0x7f00000006c0), 0x14082, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r4, 0x112, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) 07:58:14 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x2800, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0xfffffff8, 0x5, 0x7fffffff, 0x80, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0xb}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}]}, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r1, 0x1, r2, r3, 0x1]}, 0x80) r4 = socket(0x10, 0x6, 0x7fffffff) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) getsockopt$inet6_udp_int(r5, 0x11, 0x66, &(0x7f0000000640), &(0x7f0000000680)=0x4) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x208002, 0x0) timer_create(0x3, &(0x7f0000000180)={0x0, 0xa, 0x1, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) timer_delete(r7) ioctl$USBDEVFS_GET_CAPABILITIES(0xffffffffffffffff, 0x8004551a, &(0x7f0000000740)) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x8, 0x20, 0x8, 0x164, r5, 0x7f29a52d, '\x00', 0x0, r6, 0x4, 0x3, 0x2, 0xf}, 0x48) openat$vcsa(0xffffffffffffff9c, &(0x7f00000006c0), 0x14082, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r4, 0x112, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 286.787984][ T1836] blk_print_req_error: 8 callbacks suppressed [ 286.787999][ T1836] I/O error, dev loop0, sector 32640 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 07:58:14 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0xb, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xd7f6}, [@ldst={0x2, 0x0, 0x1, 0x0, 0x2, 0x50, 0x8}, @generic={0x3f, 0xd, 0x9, 0x5, 0x9688}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0xff}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @cb_func={0x18, 0x6, 0x4, 0x0, 0x8}, @exit]}, &(0x7f0000000000)='GPL\x00', 0x184fce6b, 0xba, &(0x7f0000000100)=""/186, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x3, 0x9, 0xffffffff, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000240)=[r0, 0x1]}, 0x80) fsopen(&(0x7f0000000040)='sysfs\x00', 0x1) 07:58:14 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:14 executing program 2: request_key(&(0x7f0000001380)='keyring\x00', 0x0, 0x0, 0xfffffffffffffffc) 07:58:14 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:14 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x2800, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0xfffffff8, 0x5, 0x7fffffff, 0x80, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0xb}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}]}, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r1, 0x1, r2, r3, 0x1]}, 0x80) socket(0x10, 0x6, 0x7fffffff) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) getsockopt$inet6_udp_int(r4, 0x11, 0x66, &(0x7f0000000640), &(0x7f0000000680)=0x4) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x208002, 0x0) timer_create(0x3, &(0x7f0000000180)={0x0, 0xa, 0x1, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) timer_delete(r6) ioctl$USBDEVFS_GET_CAPABILITIES(0xffffffffffffffff, 0x8004551a, &(0x7f0000000740)) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x8, 0x20, 0x8, 0x164, r4, 0x7f29a52d, '\x00', 0x0, r5, 0x4, 0x3, 0x2, 0xf}, 0x48) openat$vcsa(0xffffffffffffff9c, &(0x7f00000006c0), 0x14082, 0x0) 07:58:14 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x2800, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0xfffffff8, 0x5, 0x7fffffff, 0x80, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0xb}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}]}, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r1, 0x1, r2, r3, 0x1]}, 0x80) socket(0x10, 0x6, 0x7fffffff) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) getsockopt$inet6_udp_int(r4, 0x11, 0x66, &(0x7f0000000640), &(0x7f0000000680)=0x4) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x208002, 0x0) timer_create(0x3, &(0x7f0000000180)={0x0, 0xa, 0x1, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) timer_delete(r6) ioctl$USBDEVFS_GET_CAPABILITIES(0xffffffffffffffff, 0x8004551a, &(0x7f0000000740)) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x8, 0x20, 0x8, 0x164, r4, 0x7f29a52d, '\x00', 0x0, r5, 0x4, 0x3, 0x2, 0xf}, 0x48) openat$vcsa(0xffffffffffffff9c, &(0x7f00000006c0), 0x14082, 0x0) 07:58:14 executing program 2: request_key(&(0x7f0000001380)='keyring\x00', 0x0, 0x0, 0xfffffffffffffffc) 07:58:14 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:14 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:14 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0xb, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xd7f6}, [@ldst={0x2, 0x0, 0x1, 0x0, 0x2, 0x50, 0x8}, @generic={0x3f, 0xd, 0x9, 0x5, 0x9688}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0xff}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @cb_func={0x18, 0x6, 0x4, 0x0, 0x8}, @exit]}, &(0x7f0000000000)='GPL\x00', 0x184fce6b, 0xba, &(0x7f0000000100)=""/186, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x3, 0x9, 0xffffffff, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000240)=[r0, 0x1]}, 0x80) fsopen(&(0x7f0000000040)='sysfs\x00', 0x1) 07:58:14 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x2800, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0xfffffff8, 0x5, 0x7fffffff, 0x80, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0xb}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}]}, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r1, 0x1, r2, r3, 0x1]}, 0x80) socket(0x10, 0x6, 0x7fffffff) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) getsockopt$inet6_udp_int(r4, 0x11, 0x66, &(0x7f0000000640), &(0x7f0000000680)=0x4) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x208002, 0x0) timer_create(0x3, &(0x7f0000000180)={0x0, 0xa, 0x1, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) timer_delete(r6) ioctl$USBDEVFS_GET_CAPABILITIES(0xffffffffffffffff, 0x8004551a, &(0x7f0000000740)) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x8, 0x20, 0x8, 0x164, r4, 0x7f29a52d, '\x00', 0x0, r5, 0x4, 0x3, 0x2, 0xf}, 0x48) 07:58:14 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x2800, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0xfffffff8, 0x5, 0x7fffffff, 0x80, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0xb}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}]}, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r1, 0x1, r2, r3, 0x1]}, 0x80) socket(0x10, 0x6, 0x7fffffff) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) getsockopt$inet6_udp_int(r4, 0x11, 0x66, &(0x7f0000000640), &(0x7f0000000680)=0x4) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x208002, 0x0) timer_create(0x3, &(0x7f0000000180)={0x0, 0xa, 0x1, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) timer_delete(r6) ioctl$USBDEVFS_GET_CAPABILITIES(0xffffffffffffffff, 0x8004551a, &(0x7f0000000740)) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x8, 0x20, 0x8, 0x164, r4, 0x7f29a52d, '\x00', 0x0, r5, 0x4, 0x3, 0x2, 0xf}, 0x48) 07:58:14 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000080)={'\x00', 0xfffffffd, 0x0, 0x2}) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f0000000140)={'\x00', 0xfda, 0x3, 0x9}) socket$l2tp6(0xa, 0x2, 0x73) connect$802154_dgram(r0, &(0x7f0000000000)={0x24, @short={0x2, 0x2, 0xaaa1}}, 0x14) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r1) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, 0x0, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @private=0xa010100}, @L2TP_ATTR_PW_TYPE={0x6}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44801}, 0x24000004) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xa0b6) 07:58:14 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000780), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:14 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:14 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) fsopen(&(0x7f0000000040)='sysfs\x00', 0x1) 07:58:14 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x2800, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0xfffffff8, 0x5, 0x7fffffff, 0x80, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0xb}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}]}, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r1, 0x1, r2, r3, 0x1]}, 0x80) socket(0x10, 0x6, 0x7fffffff) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) getsockopt$inet6_udp_int(r4, 0x11, 0x66, &(0x7f0000000640), &(0x7f0000000680)=0x4) openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x208002, 0x0) timer_create(0x3, &(0x7f0000000180)={0x0, 0xa, 0x1, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) timer_delete(r5) ioctl$USBDEVFS_GET_CAPABILITIES(0xffffffffffffffff, 0x8004551a, &(0x7f0000000740)) 07:58:14 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x2800, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0xfffffff8, 0x5, 0x7fffffff, 0x80, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0xb}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}]}, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r1, 0x1, r2, r3, 0x1]}, 0x80) socket(0x10, 0x6, 0x7fffffff) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) getsockopt$inet6_udp_int(r4, 0x11, 0x66, &(0x7f0000000640), &(0x7f0000000680)=0x4) openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x208002, 0x0) timer_create(0x3, &(0x7f0000000180)={0x0, 0xa, 0x1, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) timer_delete(r5) ioctl$USBDEVFS_GET_CAPABILITIES(0xffffffffffffffff, 0x8004551a, &(0x7f0000000740)) 07:58:14 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000080)={'\x00', 0xfffffffd, 0x0, 0x2}) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f0000000140)={'\x00', 0xfda, 0x3, 0x9}) socket$l2tp6(0xa, 0x2, 0x73) connect$802154_dgram(r0, &(0x7f0000000000)={0x24, @short={0x2, 0x2, 0xaaa1}}, 0x14) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r1) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, 0x0, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @private=0xa010100}, @L2TP_ATTR_PW_TYPE={0x6}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44801}, 0x24000004) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xa0b6) 07:58:14 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:14 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000780), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:14 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x2800, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0xfffffff8, 0x5, 0x7fffffff, 0x80, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0xb}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}]}, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r1, 0x1, r2, r3, 0x1]}, 0x80) socket(0x10, 0x6, 0x7fffffff) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) getsockopt$inet6_udp_int(r4, 0x11, 0x66, &(0x7f0000000640), &(0x7f0000000680)=0x4) openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x208002, 0x0) timer_create(0x3, &(0x7f0000000180)={0x0, 0xa, 0x1, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) timer_delete(r5) 07:58:14 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:14 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) fsopen(&(0x7f0000000040)='sysfs\x00', 0x1) 07:58:14 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x2800, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0xfffffff8, 0x5, 0x7fffffff, 0x80, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0xb}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}]}, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r1, 0x1, r2, r3, 0x1]}, 0x80) socket(0x10, 0x6, 0x7fffffff) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) getsockopt$inet6_udp_int(r4, 0x11, 0x66, &(0x7f0000000640), &(0x7f0000000680)=0x4) openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x208002, 0x0) timer_create(0x3, &(0x7f0000000180)={0x0, 0xa, 0x1, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) timer_delete(r5) 07:58:14 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000780), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:14 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000080)={'\x00', 0xfffffffd, 0x0, 0x2}) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f0000000140)={'\x00', 0xfda, 0x3, 0x9}) socket$l2tp6(0xa, 0x2, 0x73) connect$802154_dgram(r0, &(0x7f0000000000)={0x24, @short={0x2, 0x2, 0xaaa1}}, 0x14) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r1) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, 0x0, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @private=0xa010100}, @L2TP_ATTR_PW_TYPE={0x6}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44801}, 0x24000004) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0xa0b6) 07:58:14 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x2800, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0xfffffff8, 0x5, 0x7fffffff, 0x80, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0xb}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}]}, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r1, 0x1, r2, r3, 0x1]}, 0x80) socket(0x10, 0x6, 0x7fffffff) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) getsockopt$inet6_udp_int(r4, 0x11, 0x66, &(0x7f0000000640), &(0x7f0000000680)=0x4) openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x208002, 0x0) timer_create(0x3, &(0x7f0000000180)={0x0, 0xa, 0x1, @tid=0xffffffffffffffff}, &(0x7f00000001c0)) 07:58:14 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:14 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000080)={'\x00', 0xfffffffd, 0x0, 0x2}) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f0000000140)={'\x00', 0xfda, 0x3, 0x9}) socket$l2tp6(0xa, 0x2, 0x73) connect$802154_dgram(r0, &(0x7f0000000000)={0x24, @short={0x2, 0x2, 0xaaa1}}, 0x14) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r1) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, 0x0, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @private=0xa010100}, @L2TP_ATTR_PW_TYPE={0x6}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44801}, 0x24000004) 07:58:14 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:14 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) fsopen(&(0x7f0000000040)='sysfs\x00', 0x1) 07:58:14 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x2800, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0xfffffff8, 0x5, 0x7fffffff, 0x80, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0xb}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}]}, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r1, 0x1, r2, r3, 0x1]}, 0x80) socket(0x10, 0x6, 0x7fffffff) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) getsockopt$inet6_udp_int(r4, 0x11, 0x66, &(0x7f0000000640), &(0x7f0000000680)=0x4) openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x208002, 0x0) timer_create(0x3, &(0x7f0000000180)={0x0, 0xa, 0x1, @tid=0xffffffffffffffff}, &(0x7f00000001c0)) 07:58:14 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x2800, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0xfffffff8, 0x5, 0x7fffffff, 0x80, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0xb}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}]}, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r1, 0x1, r2, r3, 0x1]}, 0x80) socket(0x10, 0x6, 0x7fffffff) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) getsockopt$inet6_udp_int(r4, 0x11, 0x66, &(0x7f0000000640), &(0x7f0000000680)=0x4) openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x208002, 0x0) 07:58:14 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000080)={'\x00', 0xfffffffd, 0x0, 0x2}) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f0000000140)={'\x00', 0xfda, 0x3, 0x9}) socket$l2tp6(0xa, 0x2, 0x73) connect$802154_dgram(r0, &(0x7f0000000000)={0x24, @short={0x2, 0x2, 0xaaa1}}, 0x14) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r1) 07:58:14 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x2800, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0xfffffff8, 0x5, 0x7fffffff, 0x80, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0xb}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}]}, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r1, 0x1, r2, r3, 0x1]}, 0x80) socket(0x10, 0x6, 0x7fffffff) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) getsockopt$inet6_udp_int(r4, 0x11, 0x66, &(0x7f0000000640), &(0x7f0000000680)=0x4) openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x208002, 0x0) 07:58:14 executing program 0: fsopen(&(0x7f0000000040)='sysfs\x00', 0x1) 07:58:14 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x2800, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0xfffffff8, 0x5, 0x7fffffff, 0x80, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0xb}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}]}, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r1, 0x1, r2, r3, 0x1]}, 0x80) socket(0x10, 0x6, 0x7fffffff) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) getsockopt$inet6_udp_int(r4, 0x11, 0x66, &(0x7f0000000640), &(0x7f0000000680)=0x4) 07:58:14 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:14 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, r0) 07:58:14 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000080)={'\x00', 0xfffffffd, 0x0, 0x2}) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f0000000140)={'\x00', 0xfda, 0x3, 0x9}) socket$l2tp6(0xa, 0x2, 0x73) connect$802154_dgram(r0, &(0x7f0000000000)={0x24, @short={0x2, 0x2, 0xaaa1}}, 0x14) socket$nl_generic(0x10, 0x3, 0x10) 07:58:14 executing program 0: fsopen(0x0, 0x1) 07:58:14 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:14 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x2800, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0xfffffff8, 0x5, 0x7fffffff, 0x80, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0xb}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}]}, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r1, 0x1, r2, r3, 0x1]}, 0x80) socket(0x10, 0x6, 0x7fffffff) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) getsockopt$inet6_udp_int(r4, 0x11, 0x66, &(0x7f0000000640), &(0x7f0000000680)=0x4) 07:58:14 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x2800, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0xfffffff8, 0x5, 0x7fffffff, 0x80, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0xb}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}]}, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r1, 0x1, r2, r3, 0x1]}, 0x80) socket(0x10, 0x6, 0x7fffffff) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) 07:58:14 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, r0) 07:58:14 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000080)={'\x00', 0xfffffffd, 0x0, 0x2}) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f0000000140)={'\x00', 0xfda, 0x3, 0x9}) socket$l2tp6(0xa, 0x2, 0x73) connect$802154_dgram(r0, &(0x7f0000000000)={0x24, @short={0x2, 0x2, 0xaaa1}}, 0x14) 07:58:14 executing program 0: fsopen(0x0, 0x1) 07:58:14 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:14 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x2800, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0xfffffff8, 0x5, 0x7fffffff, 0x80, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0xb}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}]}, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r1, 0x1, r2, r3, 0x1]}, 0x80) socket(0x10, 0x6, 0x7fffffff) 07:58:14 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000080)={'\x00', 0xfffffffd, 0x0, 0x2}) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f0000000140)={'\x00', 0xfda, 0x3, 0x9}) connect$802154_dgram(r0, &(0x7f0000000000)={0x24, @short={0x2, 0x2, 0xaaa1}}, 0x14) 07:58:14 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, r0) 07:58:14 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x2800, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0xfffffff8, 0x5, 0x7fffffff, 0x80, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0xb}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}]}, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r1, 0x1, r2, r3, 0x1]}, 0x80) socket(0x10, 0x6, 0x7fffffff) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) 07:58:14 executing program 0: fsopen(0x0, 0x1) 07:58:14 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, 0x0, 0x0, r0) 07:58:14 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0), 0x0, r0) 07:58:14 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x2800, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0xfffffff8, 0x5, 0x7fffffff, 0x80, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0xb}, 0x48) socket(0x10, 0x6, 0x7fffffff) 07:58:14 executing program 0: fsopen(&(0x7f0000000040)='sysfs\x00', 0x0) 07:58:14 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000080)={'\x00', 0xfffffffd, 0x0, 0x2}) connect$802154_dgram(r0, &(0x7f0000000000)={0x24, @short={0x2, 0x2, 0xaaa1}}, 0x14) 07:58:14 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x2800, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0xfffffff8, 0x5, 0x7fffffff, 0x80, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0xb}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}]}, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r1, 0x1, r2, r3, 0x1]}, 0x80) socket(0x10, 0x6, 0x7fffffff) 07:58:14 executing program 3: add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, 0x0, 0x0, 0x0) 07:58:14 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0), 0x0, r0) 07:58:14 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, r0) 07:58:14 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x2800, 0x0) socket(0x10, 0x6, 0x7fffffff) 07:58:14 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) connect$802154_dgram(r0, &(0x7f0000000000)={0x24, @short={0x2, 0x2, 0xaaa1}}, 0x14) 07:58:14 executing program 3: add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, 0x0, 0x0, 0x0) 07:58:14 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0), 0x0, r0) 07:58:14 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, r0) 07:58:14 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socket(0x10, 0x6, 0x7fffffff) 07:58:15 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x2800, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0xfffffff8, 0x5, 0x7fffffff, 0x80, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0xb}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}]}, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r1, 0x1, r2, r3, 0x1]}, 0x80) 07:58:15 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) connect$802154_dgram(r0, &(0x7f0000000000)={0x24, @short={0x2, 0x2, 0xaaa1}}, 0x14) 07:58:15 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a", 0x54, r0) 07:58:15 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) socket(0x10, 0x6, 0x7fffffff) 07:58:15 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x2800, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}]}, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r1, 0x1, r2, 0xffffffffffffffff, 0x1]}, 0x80) 07:58:15 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, r0) 07:58:15 executing program 3: add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, 0x0, 0x0, 0x0) 07:58:15 executing program 0: add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0x0) 07:58:15 executing program 2: connect$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @short={0x2, 0x2, 0xaaa1}}, 0x14) 07:58:15 executing program 3: add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, 0x0, 0x0, 0x0) 07:58:15 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af", 0x1, r0) 07:58:15 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}]}, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) 07:58:15 executing program 0: add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0x0) 07:58:15 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) socket(0x10, 0x6, 0x7fffffff) 07:58:15 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af", 0x1, r0) 07:58:15 executing program 2: connect$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @short={0x2, 0x2, 0xaaa1}}, 0x14) 07:58:15 executing program 0: add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0x0) 07:58:15 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af", 0x1, r0) 07:58:15 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) socket(0x10, 0x6, 0x7fffffff) 07:58:15 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}]}, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) 07:58:15 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket(0x10, 0x6, 0x7fffffff) 07:58:15 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af", 0x1, r0) 07:58:15 executing program 2: connect$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @short={0x2, 0x2, 0xaaa1}}, 0x14) 07:58:15 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}]}, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) 07:58:15 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af", 0x1, r0) 07:58:15 executing program 0: r0 = add_key$keyring(0x0, &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, r0) 07:58:15 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584", 0x2b, r0) 07:58:15 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}]}, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) 07:58:15 executing program 4: socket(0x10, 0x6, 0x7fffffff) 07:58:15 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x80000, 0x0) connect$802154_dgram(r0, &(0x7f0000000000)={0x24, @short={0x2, 0x2, 0xaaa1}}, 0x14) 07:58:15 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af", 0x1, r0) 07:58:15 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af63", 0x2, r0) 07:58:15 executing program 4: socket(0x0, 0x6, 0x7fffffff) 07:58:15 executing program 0: r0 = add_key$keyring(0x0, &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, r0) 07:58:15 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x80000, 0x0) connect$802154_dgram(r0, &(0x7f0000000000)={0x24, @short={0x2, 0x2, 0xaaa1}}, 0x14) 07:58:15 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x5, &(0x7f0000000e00)=@raw=[@generic={0x9}, @map_fd, @map_fd], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0x1}]}, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) 07:58:15 executing program 3: add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af", 0x1, 0x0) 07:58:15 executing program 0: r0 = add_key$keyring(0x0, &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, r0) 07:58:15 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x80000, 0x0) connect$802154_dgram(r0, &(0x7f0000000000)={0x24, @short={0x2, 0x2, 0xaaa1}}, 0x14) 07:58:15 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af63", 0x2, r0) 07:58:15 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0x1}]}, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) 07:58:15 executing program 4: socket(0x0, 0x6, 0x7fffffff) 07:58:15 executing program 3: add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af", 0x1, 0x0) 07:58:15 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, r0) 07:58:15 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 07:58:15 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) connect$802154_dgram(r0, &(0x7f0000000000)={0x24, @short={0x2, 0x2, 0xaaa1}}, 0x14) 07:58:15 executing program 4: socket(0x0, 0x6, 0x7fffffff) 07:58:15 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af63", 0x2, r0) 07:58:15 executing program 3: add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af", 0x1, 0x0) 07:58:15 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, r0) 07:58:15 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60", 0x17, r0) 07:58:15 executing program 3: r0 = add_key$keyring(0x0, &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af", 0x1, r0) 07:58:15 executing program 4: socket(0x10, 0x0, 0x7fffffff) 07:58:15 executing program 2: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) connect$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @short={0x2, 0x2, 0xaaa1}}, 0x14) 07:58:15 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 07:58:15 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, r0) 07:58:15 executing program 2: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) connect$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @short={0x2, 0x2, 0xaaa1}}, 0x14) 07:58:15 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 07:58:15 executing program 3: r0 = add_key$keyring(0x0, &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af", 0x1, r0) 07:58:15 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398", 0x3, r0) 07:58:15 executing program 4: socket(0x10, 0x0, 0x0) 07:58:15 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, r0) 07:58:15 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398", 0x3, r0) 07:58:15 executing program 3: r0 = add_key$keyring(0x0, &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af", 0x1, r0) 07:58:15 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x0, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0x1}]}, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) 07:58:15 executing program 2: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) connect$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @short={0x2, 0x2, 0xaaa1}}, 0x14) 07:58:15 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, r0) 07:58:15 executing program 4: socket(0x10, 0x0, 0x0) 07:58:15 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) connect$802154_dgram(r0, 0x0, 0x0) 07:58:15 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x0, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0x1}]}, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) 07:58:15 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398", 0x3, r0) 07:58:15 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af", 0x1, r0) 07:58:15 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, r0) 07:58:15 executing program 4: socket(0x10, 0x0, 0x0) 07:58:15 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) connect$802154_dgram(r0, 0x0, 0x0) 07:58:15 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x0, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0x1}]}, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) 07:58:15 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f549", 0xd, r0) 07:58:15 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af", 0x1, r0) 07:58:15 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, 0x0, 0x0, r0) 07:58:15 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) connect$802154_dgram(r0, 0x0, 0x0) 07:58:15 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398", 0x3, r0) 07:58:15 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x0, 0x0, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) 07:58:15 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) connect$802154_dgram(r0, 0x0, 0x0) 07:58:15 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) connect$802154_dgram(r0, 0x0, 0x0) 07:58:15 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af", 0x1, r0) 07:58:15 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, 0x0, 0x0, r0) 07:58:15 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398", 0x3, r0) 07:58:15 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af", 0x1, r0) 07:58:15 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) connect$802154_dgram(r0, &(0x7f0000000000)={0x24, @short={0x2, 0x0, 0xaaa1}}, 0x14) 07:58:15 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x0, 0x0, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) 07:58:15 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) connect$802154_dgram(r0, 0x0, 0x0) 07:58:15 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, 0x0, 0x0, r0) 07:58:15 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398", 0x3, r0) 07:58:15 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af", 0x1, r0) 07:58:15 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x0, 0x0, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) 07:58:15 executing program 0: add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0x0) 07:58:15 executing program 4: connect$802154_dgram(0xffffffffffffffff, 0x0, 0x0) 07:58:15 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad1523", 0x8, r0) 07:58:15 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) connect$802154_dgram(r0, &(0x7f0000000000)={0x24, @short}, 0x14) 07:58:15 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0x1}]}, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) 07:58:15 executing program 2: socket(0x10, 0x0, 0x0) 07:58:15 executing program 4: connect$802154_dgram(0xffffffffffffffff, 0x0, 0x0) 07:58:15 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af", 0x1, r0) 07:58:15 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x5, &(0x7f0000000200)=@framed={{}, [@map_fd={0x18, 0x1}]}, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) 07:58:15 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad1523", 0x8, r0) 07:58:15 executing program 0: add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0x0) 07:58:15 executing program 4: connect$802154_dgram(0xffffffffffffffff, 0x0, 0x0) 07:58:15 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000700)='GPL\x00', 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) 07:58:15 executing program 2: socket(0x10, 0x0, 0x0) 07:58:15 executing program 0: add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0x0) 07:58:15 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0)="af", 0x1, r0) 07:58:15 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad1523", 0x8, r0) 07:58:15 executing program 2: socket(0x10, 0x0, 0x0) 07:58:15 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$802154_dgram(r0, 0x0, 0x0) 07:58:15 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0)="af", 0x1, r0) 07:58:15 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) fsopen(&(0x7f0000000040)='sysfs\x00', 0x1) 07:58:15 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x3, &(0x7f0000000200)=@framed, 0x0, 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) 07:58:15 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600", 0xb, r0) 07:58:15 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$802154_dgram(r0, 0x0, 0x0) 07:58:15 executing program 2: socket(0x0, 0x0, 0x0) 07:58:15 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0)="af", 0x1, r0) 07:58:15 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:15 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600", 0xb, r0) 07:58:15 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x3, &(0x7f0000000200)=@framed, 0x0, 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) 07:58:15 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, r0) 07:58:15 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$802154_dgram(r0, 0x0, 0x0) 07:58:15 executing program 2: socket(0x0, 0x0, 0x0) 07:58:15 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:15 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600", 0xb, r0) 07:58:15 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, r0) 07:58:16 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x3, &(0x7f0000000200)=@framed, 0x0, 0x835, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) 07:58:16 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:16 executing program 4: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) connect$802154_dgram(0xffffffffffffffff, 0x0, 0x0) 07:58:16 executing program 2: socket(0x0, 0x0, 0x0) 07:58:16 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5", 0xc, r0) 07:58:16 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, r0) 07:58:16 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000700)='GPL\x00', 0x0, 0x74, &(0x7f0000000280)=""/116, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) 07:58:16 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600", 0xb, r0) 07:58:16 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0), 0x0, r0) 07:58:16 executing program 0: add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, 0x0) 07:58:16 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) r2 = fsmount(r1, 0x0, 0x1) r3 = socket(0x2a, 0x2, 0x7) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r3, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r4, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) r5 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x61, 0x38, 0x36, 0x65, 0x64, 0x66, 0x35, 0x65, 0x36, 0x65, 0x0, 0x64, 0x66, 0x36, 0x30, 0x38]}, &(0x7f0000000180)={0x0, "1d790c5d93ac462840352535871a78b7c33c298e06938f823fb75ad05966df75169beb401df8c13bf6e37bd2b6b36a57787077a48a492dd0b343680e859f8e3c", 0x1e}, 0x48, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="64230fa39f1c", 0x6}], 0x1, r5) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, r5) keyctl$negate(0xd, r5, 0x2, r6) ioctl$PTP_SYS_OFFSET_PRECISE(r2, 0xc0403d08, &(0x7f0000000000)) 07:58:16 executing program 4: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) connect$802154_dgram(0xffffffffffffffff, 0x0, 0x0) 07:58:16 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600", 0xb, r0) 07:58:16 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) 07:58:16 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) r2 = fsmount(r1, 0x0, 0x1) r3 = socket(0x2a, 0x2, 0x7) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r3, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r4, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) r5 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x61, 0x38, 0x36, 0x65, 0x64, 0x66, 0x35, 0x65, 0x36, 0x65, 0x0, 0x64, 0x66, 0x36, 0x30, 0x38]}, &(0x7f0000000180)={0x0, "1d790c5d93ac462840352535871a78b7c33c298e06938f823fb75ad05966df75169beb401df8c13bf6e37bd2b6b36a57787077a48a492dd0b343680e859f8e3c", 0x1e}, 0x48, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="64230fa39f1c", 0x6}], 0x1, r5) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, r5) keyctl$negate(0xd, r5, 0x2, r6) ioctl$PTP_SYS_OFFSET_PRECISE(r2, 0xc0403d08, &(0x7f0000000000)) [ 288.506732][ T1857] ================================================================== [ 288.514849][ T1857] BUG: KCSAN: data-race in _find_next_bit / ext4_free_inode [ 288.522153][ T1857] [ 288.522160][ T1857] read-write to 0xffff88823ff0b088 of 8 bytes by task 1828 on cpu 1: [ 288.522178][ T1857] ext4_free_inode+0x5bf/0xa30 [ 288.522201][ T1857] ext4_evict_inode+0xbff/0xf10 [ 288.522224][ T1857] evict+0x1aa/0x410 [ 288.522245][ T1857] iput+0x3ef/0x580 [ 288.549827][ T1857] vfs_rmdir+0x270/0x320 07:58:16 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0), 0x0, r0) 07:58:16 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) 07:58:16 executing program 1: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600", 0xb, r0) 07:58:16 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) 07:58:16 executing program 3: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0), 0x0, r0) [ 288.554076][ T1857] do_rmdir+0x18d/0x330 [ 288.558239][ T1857] __x64_sys_rmdir+0x2c/0x30 [ 288.562835][ T1857] do_syscall_64+0x44/0xd0 [ 288.567250][ T1857] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 288.573150][ T1857] [ 288.575468][ T1857] read to 0xffff88823ff0b088 of 8 bytes by task 1857 on cpu 0: [ 288.583002][ T1857] _find_next_bit+0xe0/0x190 [ 288.587606][ T1857] find_inode_bit+0xc8/0x330 [ 288.592202][ T1857] __ext4_new_inode+0xbf4/0x30b0 [ 288.597236][ T1857] ext4_mkdir+0x28a/0x760 [ 288.601571][ T1857] vfs_mkdir+0x216/0x320 07:58:16 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x5, 0xc, 0xd4a, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) [ 288.605816][ T1857] do_mkdirat+0x12e/0x2c0 [ 288.610140][ T1857] __x64_sys_mkdir+0x40/0x50 [ 288.614730][ T1857] do_syscall_64+0x44/0xd0 [ 288.619146][ T1857] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 288.625040][ T1857] [ 288.627356][ T1857] value changed: 0xbfffffffffffffff -> 0x7fffffffffffffff [ 288.634455][ T1857] [ 288.636766][ T1857] Reported by Kernel Concurrency Sanitizer on: [ 288.642902][ T1857] CPU: 0 PID: 1857 Comm: syz-executor.4 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 07:58:16 executing program 0: add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, 0x0) 07:58:16 executing program 1: add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5", 0xc, 0x0) 07:58:16 executing program 4: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) connect$802154_dgram(0xffffffffffffffff, 0x0, 0x0) 07:58:16 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) 07:58:16 executing program 3: add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af", 0x1, 0x0) [ 288.653312][ T1857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.663363][ T1857] ================================================================== 07:58:16 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) r2 = fsmount(r1, 0x0, 0x1) r3 = socket(0x2a, 0x2, 0x7) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r3, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r4, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) r5 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x61, 0x38, 0x36, 0x65, 0x64, 0x66, 0x35, 0x65, 0x36, 0x65, 0x0, 0x64, 0x66, 0x36, 0x30, 0x38]}, &(0x7f0000000180)={0x0, "1d790c5d93ac462840352535871a78b7c33c298e06938f823fb75ad05966df75169beb401df8c13bf6e37bd2b6b36a57787077a48a492dd0b343680e859f8e3c", 0x1e}, 0x48, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="64230fa39f1c", 0x6}], 0x1, r5) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, r5) keyctl$negate(0xd, r5, 0x2, r6) ioctl$PTP_SYS_OFFSET_PRECISE(r2, 0xc0403d08, &(0x7f0000000000)) 07:58:16 executing program 0: add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, 0x0) 07:58:16 executing program 1: add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5", 0xc, 0x0) 07:58:16 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) r2 = fsmount(r1, 0x0, 0x1) r3 = socket(0x2a, 0x2, 0x7) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r3, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r4, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) r5 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x61, 0x38, 0x36, 0x65, 0x64, 0x66, 0x35, 0x65, 0x36, 0x65, 0x0, 0x64, 0x66, 0x36, 0x30, 0x38]}, &(0x7f0000000180)={0x0, "1d790c5d93ac462840352535871a78b7c33c298e06938f823fb75ad05966df75169beb401df8c13bf6e37bd2b6b36a57787077a48a492dd0b343680e859f8e3c", 0x1e}, 0x48, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="64230fa39f1c", 0x6}], 0x1, r5) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, r5) keyctl$negate(0xd, r5, 0x2, r6) ioctl$PTP_SYS_OFFSET_PRECISE(r2, 0xc0403d08, &(0x7f0000000000)) 07:58:16 executing program 3: add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af", 0x1, 0x0) 07:58:16 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) fsmount(r1, 0x0, 0x1) r2 = socket(0x2a, 0x2, 0x7) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r3, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) r4 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x61, 0x38, 0x36, 0x65, 0x64, 0x66, 0x35, 0x65, 0x36, 0x65, 0x0, 0x64, 0x66, 0x36, 0x30, 0x38]}, &(0x7f0000000180)={0x0, "1d790c5d93ac462840352535871a78b7c33c298e06938f823fb75ad05966df75169beb401df8c13bf6e37bd2b6b36a57787077a48a492dd0b343680e859f8e3c", 0x1e}, 0x48, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="64230fa39f1c", 0x6}], 0x1, r4) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$negate(0xd, r4, 0x2, r5) 07:58:16 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3a, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 07:58:16 executing program 0: r0 = add_key$keyring(0x0, &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:16 executing program 1: add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af6398a5b7ad152375c600f5", 0xc, 0x0) 07:58:16 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) r2 = fsmount(r1, 0x0, 0x1) r3 = socket(0x2a, 0x2, 0x7) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r3, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r4, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) r5 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x61, 0x38, 0x36, 0x65, 0x64, 0x66, 0x35, 0x65, 0x36, 0x65, 0x0, 0x64, 0x66, 0x36, 0x30, 0x38]}, &(0x7f0000000180)={0x0, "1d790c5d93ac462840352535871a78b7c33c298e06938f823fb75ad05966df75169beb401df8c13bf6e37bd2b6b36a57787077a48a492dd0b343680e859f8e3c", 0x1e}, 0x48, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="64230fa39f1c", 0x6}], 0x1, r5) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, r5) keyctl$negate(0xd, r5, 0x2, r6) ioctl$PTP_SYS_OFFSET_PRECISE(r2, 0xc0403d08, &(0x7f0000000000)) 07:58:16 executing program 0: r0 = add_key$keyring(0x0, &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:16 executing program 3: add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="af", 0x1, 0x0) 07:58:16 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) r2 = fsmount(r1, 0x0, 0x1) r3 = socket(0x2a, 0x2, 0x7) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r3, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r4, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) r5 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x61, 0x38, 0x36, 0x65, 0x64, 0x66, 0x35, 0x65, 0x36, 0x65, 0x0, 0x64, 0x66, 0x36, 0x30, 0x38]}, &(0x7f0000000180)={0x0, "1d790c5d93ac462840352535871a78b7c33c298e06938f823fb75ad05966df75169beb401df8c13bf6e37bd2b6b36a57787077a48a492dd0b343680e859f8e3c", 0x1e}, 0x48, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="64230fa39f1c", 0x6}], 0x1, r5) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, r5) keyctl$negate(0xd, r5, 0x2, r6) ioctl$PTP_SYS_OFFSET_PRECISE(r2, 0xc0403d08, &(0x7f0000000000)) 07:58:16 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) fsmount(r1, 0x0, 0x1) r2 = socket(0x2a, 0x2, 0x7) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r3, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) r4 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x61, 0x38, 0x36, 0x65, 0x64, 0x66, 0x35, 0x65, 0x36, 0x65, 0x0, 0x64, 0x66, 0x36, 0x30, 0x38]}, &(0x7f0000000180)={0x0, "1d790c5d93ac462840352535871a78b7c33c298e06938f823fb75ad05966df75169beb401df8c13bf6e37bd2b6b36a57787077a48a492dd0b343680e859f8e3c", 0x1e}, 0x48, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="64230fa39f1c", 0x6}], 0x1, r4) add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, r4) 07:58:16 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) fsmount(r1, 0x0, 0x1) r2 = socket(0x2a, 0x2, 0x7) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r3, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) r4 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x61, 0x38, 0x36, 0x65, 0x64, 0x66, 0x35, 0x65, 0x36, 0x65, 0x0, 0x64, 0x66, 0x36, 0x30, 0x38]}, &(0x7f0000000180)={0x0, "1d790c5d93ac462840352535871a78b7c33c298e06938f823fb75ad05966df75169beb401df8c13bf6e37bd2b6b36a57787077a48a492dd0b343680e859f8e3c", 0x1e}, 0x48, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="64230fa39f1c", 0x6}], 0x1, r4) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$negate(0xd, r4, 0x2, r5) 07:58:16 executing program 0: r0 = add_key$keyring(0x0, &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:16 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) r2 = fsmount(r1, 0x0, 0x1) r3 = socket(0x2a, 0x2, 0x7) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r3, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r4, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) r5 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x61, 0x38, 0x36, 0x65, 0x64, 0x66, 0x35, 0x65, 0x36, 0x65, 0x0, 0x64, 0x66, 0x36, 0x30, 0x38]}, &(0x7f0000000180)={0x0, "1d790c5d93ac462840352535871a78b7c33c298e06938f823fb75ad05966df75169beb401df8c13bf6e37bd2b6b36a57787077a48a492dd0b343680e859f8e3c", 0x1e}, 0x48, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="64230fa39f1c", 0x6}], 0x1, r5) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, r5) keyctl$negate(0xd, r5, 0x2, r6) ioctl$PTP_SYS_OFFSET_PRECISE(r2, 0xc0403d08, &(0x7f0000000000)) 07:58:16 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r2, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000000240)={'wpan1\x00'}) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000040)={'wpan1\x00'}) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x2, &(0x7f0000000580)={'wpan0\x00'}) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000300), r0) fspick(r1, &(0x7f0000000200)='./file0\x00', 0x1) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x30, 0x0, 0x100, 0x70bd2d, 0x25dfdbff, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @dev={0xfe, 0x80, '\x00', 0xb}}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x20004000) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_TX_POWER(r4, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002dbd7000fcdbdf250c00000008000b000202000008000b000767000008000b00f1d86b5e08000300", @ANYRES32=r5, @ANYBLOB="08000b000100010008000b000700000008000300", @ANYRES32=0x0, @ANYBLOB="0800010000be3b45862626131dff0000"], 0x5c}, 0x1, 0x0, 0x0, 0x10094}, 0x20000081) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f00000002c0), r4) sendmsg$NL802154_CMD_SET_TX_POWER(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="00042abd7000fddbdf250c0000000c00060003000000030000000c0006000200000002d398a72e5991b7b8f13f2aada87eeb1374232cc36633ee8989a9967450797342cd82deb9971431b9481f84a4f054f1e4f080a3901fe48ede78d8dea59fb0740e25bd09d65136f28b49ed2e9ba996d8e7b434aea4f041026645cb1ab735d1e9d6262dbc"], 0x2c}}, 0x0) 07:58:16 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) fsmount(r1, 0x0, 0x1) r2 = socket(0x2a, 0x2, 0x7) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r3, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) r4 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x61, 0x38, 0x36, 0x65, 0x64, 0x66, 0x35, 0x65, 0x36, 0x65, 0x0, 0x64, 0x66, 0x36, 0x30, 0x38]}, &(0x7f0000000180)={0x0, "1d790c5d93ac462840352535871a78b7c33c298e06938f823fb75ad05966df75169beb401df8c13bf6e37bd2b6b36a57787077a48a492dd0b343680e859f8e3c", 0x1e}, 0x48, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="64230fa39f1c", 0x6}], 0x1, r4) 07:58:16 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:16 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) r2 = fsmount(r1, 0x0, 0x1) r3 = socket(0x2a, 0x2, 0x7) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r3, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r4, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) r5 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x61, 0x38, 0x36, 0x65, 0x64, 0x66, 0x35, 0x65, 0x36, 0x65, 0x0, 0x64, 0x66, 0x36, 0x30, 0x38]}, &(0x7f0000000180)={0x0, "1d790c5d93ac462840352535871a78b7c33c298e06938f823fb75ad05966df75169beb401df8c13bf6e37bd2b6b36a57787077a48a492dd0b343680e859f8e3c", 0x1e}, 0x48, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="64230fa39f1c", 0x6}], 0x1, r5) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, r5) keyctl$negate(0xd, r5, 0x2, r6) ioctl$PTP_SYS_OFFSET_PRECISE(r2, 0xc0403d08, &(0x7f0000000000)) 07:58:16 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) fsmount(r1, 0x0, 0x1) r2 = socket(0x2a, 0x2, 0x7) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r3, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) r4 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x61, 0x38, 0x36, 0x65, 0x64, 0x66, 0x35, 0x65, 0x36, 0x65, 0x0, 0x64, 0x66, 0x36, 0x30, 0x38]}, &(0x7f0000000180)={0x0, "1d790c5d93ac462840352535871a78b7c33c298e06938f823fb75ad05966df75169beb401df8c13bf6e37bd2b6b36a57787077a48a492dd0b343680e859f8e3c", 0x1e}, 0x48, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="64230fa39f1c", 0x6}], 0x1, r4) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$negate(0xd, r4, 0x2, r5) 07:58:16 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) r2 = fsmount(r1, 0x0, 0x1) r3 = socket(0x2a, 0x2, 0x7) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r3, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r4, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) r5 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x61, 0x38, 0x36, 0x65, 0x64, 0x66, 0x35, 0x65, 0x36, 0x65, 0x0, 0x64, 0x66, 0x36, 0x30, 0x38]}, &(0x7f0000000180)={0x0, "1d790c5d93ac462840352535871a78b7c33c298e06938f823fb75ad05966df75169beb401df8c13bf6e37bd2b6b36a57787077a48a492dd0b343680e859f8e3c", 0x1e}, 0x48, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="64230fa39f1c", 0x6}], 0x1, r5) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, r5) keyctl$negate(0xd, r5, 0x2, r6) ioctl$PTP_SYS_OFFSET_PRECISE(r2, 0xc0403d08, &(0x7f0000000000)) 07:58:16 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) fsmount(r1, 0x0, 0x1) r2 = socket(0x2a, 0x2, 0x7) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r3, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x61, 0x38, 0x36, 0x65, 0x64, 0x66, 0x35, 0x65, 0x36, 0x65, 0x0, 0x64, 0x66, 0x36, 0x30, 0x38]}, &(0x7f0000000180)={0x0, "1d790c5d93ac462840352535871a78b7c33c298e06938f823fb75ad05966df75169beb401df8c13bf6e37bd2b6b36a57787077a48a492dd0b343680e859f8e3c", 0x1e}, 0x48, 0xfffffffffffffff9) 07:58:16 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) fsmount(r1, 0x0, 0x1) r2 = socket(0x2a, 0x2, 0x7) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r3, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) r4 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x61, 0x38, 0x36, 0x65, 0x64, 0x66, 0x35, 0x65, 0x36, 0x65, 0x0, 0x64, 0x66, 0x36, 0x30, 0x38]}, &(0x7f0000000180)={0x0, "1d790c5d93ac462840352535871a78b7c33c298e06938f823fb75ad05966df75169beb401df8c13bf6e37bd2b6b36a57787077a48a492dd0b343680e859f8e3c", 0x1e}, 0x48, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="64230fa39f1c", 0x6}], 0x1, r4) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$negate(0xd, r4, 0x2, r5) 07:58:16 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:16 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000380), r0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = socket(0x3, 0xa, 0xffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x50, 0x0, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x101}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x4fd}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x6}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x2c}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xffff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth0_to_bridge\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x7e44fb95140bb4b2}, 0x4040) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x8, 0x1f, 0x7ff, 0x1, 0xffffffffffffffff, 0x70535ef6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8000}}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000f80)=""/4096, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x10, 0x5, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[r0, 0xffffffffffffffff, 0x1, r0, 0x1, 0xffffffffffffffff, r1, r3]}, 0x80) 07:58:16 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) fsmount(r1, 0x0, 0x1) r2 = socket(0x2a, 0x2, 0x7) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r3, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) r4 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x61, 0x38, 0x36, 0x65, 0x64, 0x66, 0x35, 0x65, 0x36, 0x65, 0x0, 0x64, 0x66, 0x36, 0x30, 0x38]}, &(0x7f0000000180)={0x0, "1d790c5d93ac462840352535871a78b7c33c298e06938f823fb75ad05966df75169beb401df8c13bf6e37bd2b6b36a57787077a48a492dd0b343680e859f8e3c", 0x1e}, 0x48, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="64230fa39f1c", 0x6}], 0x1, r4) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$negate(0xd, r4, 0x2, r5) 07:58:16 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) fsmount(r1, 0x0, 0x1) r2 = socket(0x2a, 0x2, 0x7) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r3, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) r4 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x61, 0x38, 0x36, 0x65, 0x64, 0x66, 0x35, 0x65, 0x36, 0x65, 0x0, 0x64, 0x66, 0x36, 0x30, 0x38]}, &(0x7f0000000180)={0x0, "1d790c5d93ac462840352535871a78b7c33c298e06938f823fb75ad05966df75169beb401df8c13bf6e37bd2b6b36a57787077a48a492dd0b343680e859f8e3c", 0x1e}, 0x48, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="64230fa39f1c", 0x6}], 0x1, r4) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$negate(0xd, r4, 0x2, r5) 07:58:16 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:16 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) fsmount(r1, 0x0, 0x1) r2 = socket(0x2a, 0x2, 0x7) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r3, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:16 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) fsmount(r1, 0x0, 0x1) r2 = socket(0x2a, 0x2, 0x7) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r3, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) r4 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x61, 0x38, 0x36, 0x65, 0x64, 0x66, 0x35, 0x65, 0x36, 0x65, 0x0, 0x64, 0x66, 0x36, 0x30, 0x38]}, &(0x7f0000000180)={0x0, "1d790c5d93ac462840352535871a78b7c33c298e06938f823fb75ad05966df75169beb401df8c13bf6e37bd2b6b36a57787077a48a492dd0b343680e859f8e3c", 0x1e}, 0x48, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="64230fa39f1c", 0x6}], 0x1, r4) add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, r4) 07:58:16 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000380), r0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = socket(0x3, 0xa, 0xffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x50, 0x0, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x101}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x4fd}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x6}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x2c}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xffff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth0_to_bridge\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x7e44fb95140bb4b2}, 0x4040) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x8, 0x1f, 0x7ff, 0x1, 0xffffffffffffffff, 0x70535ef6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8000}}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000f80)=""/4096, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x10, 0x5, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[r0, 0xffffffffffffffff, 0x1, r0, 0x1, 0xffffffffffffffff, r1, r3]}, 0x80) 07:58:16 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) fsmount(r1, 0x0, 0x1) r2 = socket(0x2a, 0x2, 0x7) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r3, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) r4 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x61, 0x38, 0x36, 0x65, 0x64, 0x66, 0x35, 0x65, 0x36, 0x65, 0x0, 0x64, 0x66, 0x36, 0x30, 0x38]}, &(0x7f0000000180)={0x0, "1d790c5d93ac462840352535871a78b7c33c298e06938f823fb75ad05966df75169beb401df8c13bf6e37bd2b6b36a57787077a48a492dd0b343680e859f8e3c", 0x1e}, 0x48, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="64230fa39f1c", 0x6}], 0x1, r4) add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, r4) 07:58:16 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) fsmount(r1, 0x0, 0x1) r2 = socket(0x2a, 0x2, 0x7) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r3, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) r4 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x61, 0x38, 0x36, 0x65, 0x64, 0x66, 0x35, 0x65, 0x36, 0x65, 0x0, 0x64, 0x66, 0x36, 0x30, 0x38]}, &(0x7f0000000180)={0x0, "1d790c5d93ac462840352535871a78b7c33c298e06938f823fb75ad05966df75169beb401df8c13bf6e37bd2b6b36a57787077a48a492dd0b343680e859f8e3c", 0x1e}, 0x48, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="64230fa39f1c", 0x6}], 0x1, r4) add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, r4) 07:58:16 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, 0x0, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:16 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) fsmount(r1, 0x0, 0x1) r2 = socket(0x2a, 0x2, 0x7) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:16 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) fsmount(r1, 0x0, 0x1) r2 = socket(0x2a, 0x2, 0x7) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r3, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) r4 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x61, 0x38, 0x36, 0x65, 0x64, 0x66, 0x35, 0x65, 0x36, 0x65, 0x0, 0x64, 0x66, 0x36, 0x30, 0x38]}, &(0x7f0000000180)={0x0, "1d790c5d93ac462840352535871a78b7c33c298e06938f823fb75ad05966df75169beb401df8c13bf6e37bd2b6b36a57787077a48a492dd0b343680e859f8e3c", 0x1e}, 0x48, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="64230fa39f1c", 0x6}], 0x1, r4) 07:58:16 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000380), r0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = socket(0x3, 0xa, 0xffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x50, 0x0, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x101}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x4fd}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x6}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x2c}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xffff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth0_to_bridge\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x7e44fb95140bb4b2}, 0x4040) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x8, 0x1f, 0x7ff, 0x1, 0xffffffffffffffff, 0x70535ef6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8000}}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000f80)=""/4096, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x10, 0x5, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[r0, 0xffffffffffffffff, 0x1, r0, 0x1, 0xffffffffffffffff, r1, r3]}, 0x80) 07:58:16 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) fsmount(r1, 0x0, 0x1) r2 = socket(0x2a, 0x2, 0x7) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r3, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) r4 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x61, 0x38, 0x36, 0x65, 0x64, 0x66, 0x35, 0x65, 0x36, 0x65, 0x0, 0x64, 0x66, 0x36, 0x30, 0x38]}, &(0x7f0000000180)={0x0, "1d790c5d93ac462840352535871a78b7c33c298e06938f823fb75ad05966df75169beb401df8c13bf6e37bd2b6b36a57787077a48a492dd0b343680e859f8e3c", 0x1e}, 0x48, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="64230fa39f1c", 0x6}], 0x1, r4) 07:58:16 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) fsmount(r1, 0x0, 0x1) r2 = socket(0x2a, 0x2, 0x7) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r3, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) r4 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x61, 0x38, 0x36, 0x65, 0x64, 0x66, 0x35, 0x65, 0x36, 0x65, 0x0, 0x64, 0x66, 0x36, 0x30, 0x38]}, &(0x7f0000000180)={0x0, "1d790c5d93ac462840352535871a78b7c33c298e06938f823fb75ad05966df75169beb401df8c13bf6e37bd2b6b36a57787077a48a492dd0b343680e859f8e3c", 0x1e}, 0x48, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="64230fa39f1c", 0x6}], 0x1, r4) 07:58:16 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) fsmount(r1, 0x0, 0x1) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:16 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, 0x0, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:16 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) fsmount(r1, 0x0, 0x1) r2 = socket(0x2a, 0x2, 0x7) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r3, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x61, 0x38, 0x36, 0x65, 0x64, 0x66, 0x35, 0x65, 0x36, 0x65, 0x0, 0x64, 0x66, 0x36, 0x30, 0x38]}, &(0x7f0000000180)={0x0, "1d790c5d93ac462840352535871a78b7c33c298e06938f823fb75ad05966df75169beb401df8c13bf6e37bd2b6b36a57787077a48a492dd0b343680e859f8e3c", 0x1e}, 0x48, 0xfffffffffffffff9) 07:58:16 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) fsmount(r1, 0x0, 0x1) r2 = socket(0x2a, 0x2, 0x7) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r3, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x61, 0x38, 0x36, 0x65, 0x64, 0x66, 0x35, 0x65, 0x36, 0x65, 0x0, 0x64, 0x66, 0x36, 0x30, 0x38]}, &(0x7f0000000180)={0x0, "1d790c5d93ac462840352535871a78b7c33c298e06938f823fb75ad05966df75169beb401df8c13bf6e37bd2b6b36a57787077a48a492dd0b343680e859f8e3c", 0x1e}, 0x48, 0xfffffffffffffff9) 07:58:16 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) fsmount(r1, 0x0, 0x1) r2 = socket(0x2a, 0x2, 0x7) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r3, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x61, 0x38, 0x36, 0x65, 0x64, 0x66, 0x35, 0x65, 0x36, 0x65, 0x0, 0x64, 0x66, 0x36, 0x30, 0x38]}, &(0x7f0000000180)={0x0, "1d790c5d93ac462840352535871a78b7c33c298e06938f823fb75ad05966df75169beb401df8c13bf6e37bd2b6b36a57787077a48a492dd0b343680e859f8e3c", 0x1e}, 0x48, 0xfffffffffffffff9) 07:58:16 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) fsmount(r1, 0x0, 0x1) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:16 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, 0x0, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a1e7d1ba79b5a12e5b46148b3e538b55486077391c81222af5ef49b624dc9e61576265eaa88bf714737c3d59a42580a0e832ce5f23b3b1bec6539c71c2f68427174fa8d5860d9115af79768f29a0a3063dd65d1", 0xa7, r0) 07:58:16 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000380), r0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = socket(0x3, 0xa, 0xffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x50, 0x0, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x101}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x4fd}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x6}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x2c}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xffff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth0_to_bridge\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x7e44fb95140bb4b2}, 0x4040) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8000}}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000f80)=""/4096, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x10, 0x5, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[r0, 0xffffffffffffffff, 0x1, r0, 0x1, 0xffffffffffffffff, r1, 0xffffffffffffffff]}, 0x80) 07:58:16 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) fsmount(r1, 0x0, 0x1) r2 = socket(0x2a, 0x2, 0x7) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r3, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:16 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) fsmount(r1, 0x0, 0x1) r2 = socket(0x2a, 0x2, 0x7) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r3, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:16 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) fsmount(r1, 0x0, 0x1) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:16 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) fsmount(r1, 0x0, 0x1) r2 = socket(0x2a, 0x2, 0x7) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r3, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:16 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, 0x0, 0x0, r0) 07:58:16 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) fsmount(r1, 0x0, 0x1) socket(0x2a, 0x2, 0x7) syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0), r1) 07:58:16 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) fsmount(r1, 0x0, 0x1) socket(0x2a, 0x2, 0x7) syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0), r1) 07:58:16 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) fsmount(r1, 0x0, 0x1) r2 = socket(0x2a, 0x2, 0x7) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:16 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) r1 = socket(0x2a, 0x2, 0x7) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:16 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000380), r0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) socket(0x3, 0xa, 0xffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8000}}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000f80)=""/4096, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x10, 0x5, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[r0, 0xffffffffffffffff, 0x1, r0, 0x1, 0xffffffffffffffff, r1, 0xffffffffffffffff]}, 0x80) 07:58:16 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, 0x0, 0x0, r0) 07:58:16 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) fsmount(r1, 0x0, 0x1) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:16 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) fsmount(r1, 0x0, 0x1) socket(0x2a, 0x2, 0x7) 07:58:16 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) fsmount(r1, 0x0, 0x1) socket(0x2a, 0x2, 0x7) 07:58:16 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = socket(0x2a, 0x2, 0x7) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:16 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000380), r0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8000}}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000f80)=""/4096, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x10, 0x5, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[r0, 0xffffffffffffffff, 0x1, r0, 0x1, 0xffffffffffffffff, r1, 0xffffffffffffffff]}, 0x80) 07:58:16 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) fsmount(r1, 0x0, 0x1) 07:58:16 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, 0x0, 0x0, r0) 07:58:16 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) r1 = socket(0x2a, 0x2, 0x7) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:16 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) fsmount(r1, 0x0, 0x1) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:16 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) socket(0x2a, 0x2, 0x7) 07:58:16 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000380), r0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8000}}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000f80)=""/4096, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x10, 0x5, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[r0, 0xffffffffffffffff, 0x1, r0, 0x1, 0xffffffffffffffff, r1, 0xffffffffffffffff]}, 0x80) 07:58:16 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0), 0x0, r0) 07:58:16 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) 07:58:16 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) fsmount(r1, 0x0, 0x1) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:16 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) r1 = socket(0x2a, 0x2, 0x7) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:16 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8000}}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000f80)=""/4096, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x10, 0x5, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[r0, 0xffffffffffffffff, 0x1, r0, 0x1, 0xffffffffffffffff, r1, 0xffffffffffffffff]}, 0x80) 07:58:16 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) socket(0x2a, 0x2, 0x7) 07:58:16 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0), 0x0, r0) 07:58:16 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) 07:58:16 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) socket(0x1, 0x80000, 0x5) r0 = socket(0x2a, 0x2, 0x7) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:16 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x26803, 0x0) r1 = socket(0x2a, 0x2, 0x7) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:16 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8000}}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000f80)=""/4096, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x10, 0x5, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[r0, 0xffffffffffffffff, 0x1, r0, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 07:58:16 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) socket(0x2a, 0x2, 0x7) 07:58:16 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x2a, 0x2, 0x7) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:17 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0), 0x0, r0) 07:58:17 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8000}}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000f80)=""/4096, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x10, 0x5, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[r0, 0xffffffffffffffff, 0x1, r0, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 07:58:17 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) 07:58:17 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = socket(0x2a, 0x2, 0x7) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:17 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) socket(0x2a, 0x2, 0x7) 07:58:17 executing program 2: r0 = socket(0x2a, 0x2, 0x7) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:17 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584f2d76ea5560cdfeaa2dc57fec072b5c968499eaa74c9c5ba68f68208bf94971f765a4bce8f8fa96f5a", 0x54, r0) 07:58:17 executing program 2: r0 = socket(0x0, 0x2, 0x7) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:17 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) 07:58:17 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8000}}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000f80)=""/4096, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x10, 0x5, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 07:58:17 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) r1 = socket(0x2a, 0x2, 0x7) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:17 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) socket(0x1, 0x80000, 0x5) socket(0x2a, 0x2, 0x7) 07:58:17 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0)="af", 0x1, r0) 07:58:17 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8000}}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000f80)=""/4096, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x10, 0x5, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 07:58:17 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) socket(0x1, 0x80000, 0x5) 07:58:17 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x1, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) r1 = socket(0x2a, 0x2, 0x7) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:17 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) socket(0x2a, 0x2, 0x7) 07:58:17 executing program 2: r0 = socket(0x0, 0x2, 0x7) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:17 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) socket(0x1, 0x80000, 0x5) r0 = socket(0x2a, 0x2, 0x7) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:17 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 07:58:17 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0)="af", 0x1, r0) 07:58:17 executing program 5: socket(0x1, 0x80000, 0x5) 07:58:17 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 07:58:17 executing program 4: socket(0x2a, 0x2, 0x7) 07:58:17 executing program 2: r0 = socket(0x0, 0x2, 0x7) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:17 executing program 4: socket(0x0, 0x2, 0x7) 07:58:17 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0)="af", 0x1, r0) 07:58:17 executing program 5: socket(0x0, 0x80000, 0x5) 07:58:17 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x29}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffa8}, 0x80) r0 = socket(0x2a, 0x2, 0x7) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:17 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60851a86d23a605e465492e8557e4aa1e16c627584", 0x2b, r0) 07:58:17 executing program 1: r0 = socket(0x2a, 0x2, 0x7) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:17 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 07:58:17 executing program 2: r0 = socket(0x2a, 0x0, 0x7) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:17 executing program 5: socket(0x0, 0x80000, 0x5) 07:58:17 executing program 4: socket(0x0, 0x2, 0x7) 07:58:17 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0)="af63", 0x2, r0) 07:58:17 executing program 1: r0 = socket(0x0, 0x2, 0x7) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:17 executing program 5: socket(0x0, 0x80000, 0x5) 07:58:17 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0)="af63", 0x2, r0) 07:58:17 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8000}}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000f80)=""/4096, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x10, 0x5, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 07:58:17 executing program 2: r0 = socket(0x2a, 0x0, 0x7) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:17 executing program 4: socket(0x0, 0x2, 0x7) 07:58:17 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8000}}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000f80)=""/4096, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x10, 0x5, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 07:58:17 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0)="af63", 0x2, r0) 07:58:17 executing program 2: r0 = socket(0x2a, 0x0, 0x7) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:17 executing program 5: socket(0x1, 0x0, 0x5) 07:58:17 executing program 1: r0 = socket(0x0, 0x2, 0x7) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:17 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8000}}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000f80)=""/4096, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x10, 0x5, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 07:58:17 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0)="af6398a5b7ad152375c600f5497b6ee6150fde4fb7ef60", 0x17, r0) 07:58:17 executing program 4: socket(0x2a, 0x0, 0x7) 07:58:17 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0)="af6398", 0x3, r0) 07:58:17 executing program 2: r0 = socket(0x2a, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:17 executing program 5: socket(0x1, 0x0, 0x0) 07:58:17 executing program 4: socket(0x2a, 0x0, 0x7) 07:58:17 executing program 1: r0 = socket(0x0, 0x2, 0x7) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:17 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000f80)=""/4096, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x10, 0x5, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 07:58:17 executing program 2: socket(0x2a, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:17 executing program 5: socket(0x1, 0x0, 0x0) 07:58:17 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0)="af6398", 0x3, r0) 07:58:17 executing program 1: r0 = socket(0x2a, 0x0, 0x7) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:17 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000f80)=""/4096, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x10, 0x5, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 07:58:17 executing program 4: socket(0x2a, 0x0, 0x7) 07:58:17 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0)="af6398", 0x3, r0) 07:58:17 executing program 2: socket(0x2a, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:17 executing program 5: socket(0x1, 0x0, 0x0) 07:58:17 executing program 1: r0 = socket(0x2a, 0x0, 0x7) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:17 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000f80)=""/4096, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x10, 0x5, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 07:58:17 executing program 1: r0 = socket(0x2a, 0x0, 0x7) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:17 executing program 4: socket(0x2a, 0x2, 0x0) 07:58:17 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0)="af6398a5b7ad152375c600f549", 0xd, r0) 07:58:17 executing program 5: socket(0x1, 0x0, 0x0) 07:58:17 executing program 2: socket(0x2a, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:17 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000f80)=""/4096, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x10, 0x5, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 07:58:17 executing program 1: r0 = socket(0x2a, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:17 executing program 5: socket(0x1, 0x0, 0x0) 07:58:17 executing program 2: r0 = socket(0x2a, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, 0x0, 0x0) 07:58:17 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0)="af6398", 0x3, r0) 07:58:17 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000380), r0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = socket(0x3, 0xa, 0xffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x50, 0x0, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x101}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x4fd}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x6}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x2c}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xffff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth0_to_bridge\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x7e44fb95140bb4b2}, 0x4040) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x8, 0x1f, 0x7ff, 0x1, 0xffffffffffffffff, 0x70535ef6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8000}}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000f80)=""/4096, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x10, 0x5, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[r0, 0xffffffffffffffff, 0x1, r0, 0x1, 0xffffffffffffffff, r1, r3]}, 0x80) 07:58:17 executing program 1: socket(0x2a, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:17 executing program 1: socket(0x2a, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:17 executing program 2: r0 = socket(0x2a, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, 0x0, 0x0) 07:58:17 executing program 5: socket(0x1, 0x0, 0x0) 07:58:17 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000f80)=""/4096, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x10, 0x5, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 07:58:17 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000380), r0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = socket(0x3, 0xa, 0xffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x50, 0x0, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x101}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x4fd}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x6}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x2c}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xffff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth0_to_bridge\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x7e44fb95140bb4b2}, 0x4040) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x8, 0x1f, 0x7ff, 0x1, 0xffffffffffffffff, 0x70535ef6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8000}}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000f80)=""/4096, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x10, 0x5, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[r0, 0xffffffffffffffff, 0x1, r0, 0x1, 0xffffffffffffffff, r1, r3]}, 0x80) 07:58:17 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x3, 0x1000, &(0x7f0000000f80)=""/4096, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x10, 0x5, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 07:58:17 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0)="af6398", 0x3, r0) 07:58:17 executing program 1: socket(0x2a, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:17 executing program 2: r0 = socket(0x2a, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, 0x0, 0x0) 07:58:17 executing program 5: socket(0x0, 0x0, 0x0) 07:58:17 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0)="af6398", 0x3, r0) 07:58:17 executing program 2: r0 = socket(0x2a, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:17 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000380), r0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = socket(0x3, 0xa, 0xffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x50, 0x0, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x101}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x4fd}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x6}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x2c}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xffff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth0_to_bridge\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x7e44fb95140bb4b2}, 0x4040) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x8, 0x1f, 0x7ff, 0x1, 0xffffffffffffffff, 0x70535ef6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8000}}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000f80)=""/4096, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x10, 0x5, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[r0, 0xffffffffffffffff, 0x1, r0, 0x1, 0xffffffffffffffff, r1, r3]}, 0x80) 07:58:17 executing program 1: r0 = socket(0x2a, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, 0x0, 0x0) 07:58:17 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x3, 0x1000, &(0x7f0000000f80)=""/4096, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x10, 0x5, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 07:58:17 executing program 2: r0 = socket(0x2a, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:17 executing program 5: socket(0x0, 0x0, 0x0) 07:58:17 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x3, 0x1000, &(0x7f0000000f80)=""/4096, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x10, 0x5, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 07:58:17 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0)="af6398a5b7ad1523", 0x8, r0) 07:58:17 executing program 1: r0 = socket(0x2a, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, 0x0, 0x0) 07:58:17 executing program 2: r0 = socket(0x2a, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:17 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000380), r0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = socket(0x3, 0xa, 0xffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x50, 0x0, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x101}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x4fd}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x6}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x2c}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xffff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth0_to_bridge\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x7e44fb95140bb4b2}, 0x4040) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x8, 0x1f, 0x7ff, 0x1, 0xffffffffffffffff, 0x70535ef6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x3}, 0x48) 07:58:17 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000f80)=""/4096, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x10, 0x5, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 07:58:17 executing program 1: r0 = socket(0x2a, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, 0x0, 0x0) 07:58:17 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0)="af6398a5b7ad1523", 0x8, r0) 07:58:17 executing program 5: socket(0x0, 0x0, 0x0) 07:58:17 executing program 2: r0 = socket(0x2a, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:17 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000380), r0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = socket(0x3, 0xa, 0xffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x50, 0x0, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x101}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x4fd}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x6}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x2c}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xffff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth0_to_bridge\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x7e44fb95140bb4b2}, 0x4040) 07:58:17 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000f80)=""/4096, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x10, 0x5, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 07:58:17 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0)="af6398a5b7ad1523", 0x8, r0) 07:58:17 executing program 2: r0 = socket(0x2a, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:17 executing program 5: r0 = socket(0x2a, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:17 executing program 1: r0 = socket(0x2a, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:17 executing program 5: r0 = socket(0x2a, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:58:17 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000f80)=""/4096, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x10, 0x5, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 07:58:17 executing program 0: r0 = add_key$keyring(&(0x7f0000000780), &(0x7f00000007c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000340)='ceph\x00', 0x0, &(0x7f00000003c0)="af6398a5b7ad152375c600", 0xb, r0) 07:58:17 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f000000