x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='device`./fira3m\x00']) syz_read_part_table(0x8001, 0x1, &(0x7f0000000180)=[{&(0x7f0000000100)="cbe88e5c2d7c84acd49a74f860f8917fbb967ee221b4ec5f1697d411620122d9ef8e60ff36c22305eb39cbd99b5217acc9bced33a7f3172243a5ba2793e8b8a6c40f9b0f02160144e82a31976fc04829a82d5b2d65a13d045e677761a5aba681", 0x60, 0x260}]) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x7, &(0x7f00000004c0)={0x32}) ptrace(0x4203, r0) ptrace$setregset(0x4205, r0, 0x3, &(0x7f0000000040)={&(0x7f0000000000)="34abd037301b7eaed37eec28ac7e9a769ab0b0723496479e831b519a8f72c85f", 0x20}) 19:29:21 executing program 5: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(0x0, &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@device={'device', 0x3d, './file0'}}, {@autodefrag='autodefrag'}]}) 19:29:21 executing program 0: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:22 executing program 2: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c", 0xc3}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(r2) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:22 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r0) getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x284a0, &(0x7f00000002c0)=ANY=[@ANYBLOB='noflushoncommit,uid=', @ANYRESDEC=r0, @ANYRES16=0x0, @ANYRESDEC=r1, @ANYBLOB="2c7063723d30303030303030303030303030303030303035372c66736d616769633d3078303030303030303030303030303030362c6673757569643d32376573333366652d653435642d666133332d313200642d39303700063002382c7065726d69745f646972656374696f2c666f776e65723c", @ANYRESDEC=r2, @ANYBLOB="45fe5ea0ccda072c736d61636b6673726f6f743f6e6f666c7573686f6e2c00"]) 19:29:22 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f7", 0xa7}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(r2) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:22 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='ref_v\x00\x00ify,\x00']) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0xfffffffffffffffd) 19:29:22 executing program 2: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:23 executing program 0: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:23 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x4000000000000016, &(0x7f00000004c0)) ptrace(0x4206, r1) ptrace(0x4203, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r2, &(0x7f0000000280), 0xfffffed3) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x81, 0x6, 0x1a, 0x3f, 0x0, 0x6, 0x2102, 0x9, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x101, 0x3}, 0x20, 0x4, 0xfffffffa, 0x9, 0x20, 0xfffffff7, 0x6}, r1, 0xb, r2, 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r3, &(0x7f0000000280), 0xfffffed3) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r4, &(0x7f0000000280), 0xfffffed3) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, &(0x7f0000000240)={0x4, [0x0, 0x0, 0x0, 0x0]}) ioctl$PPPIOCATTCHAN(r3, 0x40047438, &(0x7f0000000140)=0x3) fcntl$getownex(r2, 0x10, &(0x7f0000000200)={0x0, 0x0}) process_vm_writev(r5, &(0x7f0000001480)=[{&(0x7f0000001280)=""/107, 0x6b}, {&(0x7f0000001300)=""/97, 0x61}, {&(0x7f0000000240)}, {&(0x7f0000001380)=""/30, 0x1e}, {&(0x7f00000013c0)=""/169, 0xa9}], 0x5, &(0x7f00000015c0)=[{&(0x7f0000001500)=""/144, 0x90}], 0x1, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0xd, &(0x7f0000000000)={@rand_addr, @multicast1, @empty}, &(0x7f0000000040)=0xc) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)={[{@device={'device', 0x3d, './file0'}}]}) 19:29:23 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:23 executing program 5: setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)={[{@device={'device', 0x3d, './file0'}}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0/file0\x00', 0x7f, 0x1, &(0x7f0000000180)=[{&(0x7f0000000100)="64e8ec068bfd09921906d8d7cfd0ddd271bfc8fd137cd9785bbac07f006df71ce232b4304987fe6628d3a0ca2c57ab3abaf31600d255b94da2332c0df8e9c65bbf879b0e66195749d380826d8826281410", 0x51, 0x2}], 0x9000, &(0x7f00000001c0)={[{@cruft='cruft'}, {@check_strict='check=strict'}], [{@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@uid_eq={'uid', 0x3d, r0}}, {@subj_user={'subj_user', 0x3d, 'vmnet1user'}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, r1}}, {@permit_directio='permit_directio'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 19:29:23 executing program 2: setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:24 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x0, 0x0, 0x28b2c54, &(0x7f0000000180)={[{@nospace_cache='nospace_cache'}], [{@dont_measure='dont_measure'}, {@fsname={'fsname', 0x3d, 'noacl'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@obj_user={'obj_user', 0x3d, 'btrfs\x00'}}, {@obj_user={'obj_user', 0x3d, 'btrfs\x00'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000200)=@filter={'filter\x00', 0xe, 0x4, 0x398, 0xffffffff, 0x0, 0x0, 0x1f8, 0xffffffff, 0xffffffff, 0x2c8, 0x2c8, 0x2c8, 0xffffffff, 0x4, &(0x7f0000000000), {[{{@ipv6={@initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, [0xff, 0xff, 0xffffffff, 0xffffff00], [0xff000000, 0xff000000, 0xff000000, 0xff], 'geneve1\x00', 'veth1_virt_wifi\x00', {0xff}, {}, 0x88, 0x7, 0x6, 0x4}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x60, 0x40, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x6}}}, {{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x4d2, 0x4d3], 0x5, 0x8, 0x2}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x8}}}, {{@ipv6={@mcast1, @mcast1, [0xff, 0xff, 0xff000000, 0xff000000], [0xffffffff, 0xff0000ff, 0x0, 0xffffff00], 'bond0\x00', 'team_slave_1\x00', {0xff}, {0xff}, 0x62, 0xa8, 0x2}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3f8) 19:29:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=r1, @ANYRES32]) 19:29:24 executing program 0: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:26 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(r2) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:26 executing program 2: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(r2) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:27 executing program 2: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:27 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:27 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f0000000080)) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000002c0)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="080826bd7000fddbdf25080000001400060076657468315f746f5f6272696467650014000600767863616e31000000000000000000001400026b25d40a1b0000000000000000000000000000000000050001000000000008000500e0000002080004"], 0x68}, 0x1, 0x0, 0x0, 0x4084}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000ff07", @ANYRES16=r2, @ANYBLOB="000929bd7000fddbdf25070000001400030000000000000000000000ffff0000000008000400ac1e0001080005000000000014000200fe8000000000000000000000000000122400070073797374656d5f753a6f626a6563745f723a6170745f6c6f636b5f743a733000"], 0x70}, 0x1, 0x0, 0x0, 0x450}, 0x24000080) 19:29:27 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:28 executing program 5: setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:28 executing program 0: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)={[{@device={'device', 0x3d, './file0'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@raw={'raw\x00', 0x9, 0x3, 0x2f0, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x220, 0xffffffff, 0xffffffff, 0x220, 0xffffffff, 0x3, &(0x7f0000000000), {[{{@ipv6={@rand_addr="7a7b1647198ca3d7f517f7f89a739da0", @empty, [0x0, 0x0, 0xffffff00, 0xff], [0x0, 0xffffffff, 0xffffffff], 'rose0\x00', 'veth1_macvtap\x00', {}, {0xff}, 0x2c, 0x80, 0x6, 0x2c}, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@frag={{0x30, 'frag\x00'}, {[0x80000000, 0x1], 0xffff, 0x8, 0x3}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x2, 0x5, 0x3}, {0x0, 0x2, 0x1}, 0x101, 0x8}}}, {{@ipv6={@ipv4={[], [], @multicast2}, @mcast1, [0xff, 0x0, 0xff000000], [0xffffff00, 0xff000000, 0xffffff00, 0xffffffff], 'bridge_slave_1\x00', 'vlan0\x00', {}, {0xff}, 0x2b, 0x80, 0x3, 0x52}, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}, {0x4, 0x4, 0x0, [0x2, 0x3f0, 0x100, 0x162, 0xd7c6, 0x4, 0x5, 0x2, 0x7, 0x2e38, 0x8, 0x7ff, 0xff, 0x239c, 0x7], 0x9}}]}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x5, 0x4}, {0x0, 0x0, 0x3}}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x350) 19:29:28 executing program 2: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:28 executing program 1: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:28 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:28 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:29 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:29 executing program 1: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:29 executing program 0: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:29 executing program 5: setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:29 executing program 2: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:29 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:30 executing program 1: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {0x0}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(r2) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:30 executing program 1: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {0x0}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(r2) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:31 executing program 1: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}], 0x1, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(r2) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:31 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(r2) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:31 executing program 2: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:31 executing program 0: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:31 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, 0xffffffffffffffff) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:31 executing program 1: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, 0xffffffffffffffff) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:31 executing program 5: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280), 0x0, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(r2) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:32 executing program 5: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280), 0x0, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(r2) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:32 executing program 5: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280), 0x0, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(r2) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:33 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) pkey_alloc(0x0, 0x2) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:33 executing program 5: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) pkey_alloc(0x0, 0x2) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:33 executing program 1: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:33 executing program 0: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:34 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, 0xffffffffffffffff) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:34 executing program 2: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:34 executing program 1: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:35 executing program 5: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(r2) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:35 executing program 0: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:35 executing program 5: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(r2) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:35 executing program 5: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:36 executing program 1: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:36 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) pkey_alloc(0x0, 0x2) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:36 executing program 1: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:37 executing program 0: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(0x0, &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(r2) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:38 executing program 0: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(0x0, &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(r2) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:38 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, 0xffffffffffffffff) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:38 executing program 2: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:38 executing program 5: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(0x0, &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(r2) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:38 executing program 0: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:38 executing program 1: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(r2) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:39 executing program 5: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:39 executing program 1: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:40 executing program 0: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(r2) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:40 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) pkey_alloc(0x0, 0x2) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:40 executing program 0: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:41 executing program 2: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(r2) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:41 executing program 5: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(r2) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:42 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) pkey_alloc(0x0, 0x2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:42 executing program 2: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(r2) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:42 executing program 5: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(r2) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:42 executing program 1: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) pkey_alloc(0x0, 0x2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:42 executing program 0: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r0) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(r1) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:42 executing program 2: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:42 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:42 executing program 0: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r0) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(r1) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:42 executing program 5: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:42 executing program 0: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r0) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(r1) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:43 executing program 0: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(r2) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:43 executing program 2: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:43 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) pkey_alloc(0x0, 0x2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:43 executing program 0: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(r2) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:44 executing program 0: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(r2) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:44 executing program 1: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) pkey_alloc(0x0, 0x2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:44 executing program 0: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(r2) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, &(0x7f0000000700)={[{@device={'device', 0x3d, './file0'}}]}) 19:29:44 executing program 3 (fault-call:20 fault-nth:0): dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:44 executing program 0: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 614.210868][T22690] FAULT_INJECTION: forcing a failure. [ 614.210868][T22690] name failslab, interval 1, probability 0, space 0, times 0 [ 614.270266][T22690] CPU: 0 PID: 22690 Comm: syz-executor.3 Not tainted 5.6.0-syzkaller #0 [ 614.278638][T22690] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 614.288703][T22690] Call Trace: [ 614.292079][T22690] dump_stack+0x188/0x20d [ 614.296435][T22690] should_fail.cold+0x5/0xa [ 614.300957][T22690] ? fault_create_debugfs_attr+0x140/0x140 [ 614.306794][T22690] should_failslab+0x5/0xf [ 614.311230][T22690] kmem_cache_alloc+0x29b/0x740 [ 614.316115][T22690] ? smp_apic_timer_interrupt+0x1b6/0x600 [ 614.321972][T22690] ? retint_kernel+0x2b/0x2b [ 614.326579][T22690] getname_flags+0xd2/0x5b0 [ 614.331110][T22690] __x64_sys_execve+0x6e/0xb0 [ 614.335817][T22690] do_syscall_64+0xf6/0x7d0 [ 614.340337][T22690] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 614.346235][T22690] RIP: 0033:0x45c889 [ 614.350141][T22690] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 614.370712][T22690] RSP: 002b:00007f268ab3ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 614.379135][T22690] RAX: ffffffffffffffda RBX: 00007f268ab3f6d4 RCX: 000000000045c889 [ 614.387119][T22690] RDX: 0000000020000780 RSI: 00000000200006c0 RDI: 0000000020000440 [ 614.395104][T22690] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 614.403099][T22690] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 614.411089][T22690] R13: 00000000000000a6 R14: 00000000004c33d1 R15: 0000000000000000 19:29:45 executing program 5: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:45 executing program 1: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) pkey_alloc(0x0, 0x2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:45 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) pkey_alloc(0x0, 0x2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:45 executing program 2: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:46 executing program 2 (fault-call:9 fault-nth:0): socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4048ae9b, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:29:46 executing program 0 (fault-call:2 fault-nth:0): r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) [ 615.220322][T22719] FAULT_INJECTION: forcing a failure. [ 615.220322][T22719] name failslab, interval 1, probability 0, space 0, times 0 [ 615.338914][T22719] CPU: 1 PID: 22719 Comm: syz-executor.2 Not tainted 5.6.0-syzkaller #0 [ 615.347282][T22719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 615.357342][T22719] Call Trace: [ 615.361865][T22719] dump_stack+0x188/0x20d [ 615.366220][T22719] should_fail.cold+0x5/0xa [ 615.370743][T22719] ? fault_create_debugfs_attr+0x140/0x140 [ 615.376677][T22719] should_failslab+0x5/0xf [ 615.381107][T22719] __kmalloc+0x2d9/0x7a0 [ 615.385631][T22719] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 615.391628][T22719] ? tomoyo_realpath_from_path+0xc2/0x620 [ 615.397511][T22719] ? lock_release+0x800/0x800 [ 615.402227][T22719] ? __lock_acquire+0xcb5/0x4e00 [ 615.407195][T22719] tomoyo_realpath_from_path+0xc2/0x620 [ 615.412759][T22719] ? tomoyo_profile+0x42/0x50 [ 615.417463][T22719] tomoyo_path_number_perm+0x1c2/0x4d0 [ 615.422938][T22719] ? tomoyo_path_number_perm+0x17a/0x4d0 [ 615.429487][T22719] ? tomoyo_execute_permission+0x470/0x470 [ 615.435324][T22719] ? __fget_files+0x30d/0x500 [ 615.440034][T22719] ? selinux_file_mprotect+0x610/0x610 [ 615.445516][T22719] ? __fget_files+0x32f/0x500 [ 615.450218][T22719] ? ksys_dup3+0x3c0/0x3c0 [ 615.454646][T22719] ? __sb_end_write+0x101/0x1d0 [ 615.459515][T22719] ? vfs_write+0x161/0x5d0 [ 615.463973][T22719] security_file_ioctl+0x6c/0xb0 [ 615.469011][T22719] ksys_ioctl+0x50/0x180 [ 615.474231][T22719] __x64_sys_ioctl+0x6f/0xb0 [ 615.479269][T22719] ? lockdep_hardirqs_on+0x463/0x620 [ 615.484572][T22719] do_syscall_64+0xf6/0x7d0 [ 615.489095][T22719] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 615.494999][T22719] RIP: 0033:0x45c889 [ 615.498922][T22719] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 615.518641][T22719] RSP: 002b:00007f14bf6a1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 615.527067][T22719] RAX: ffffffffffffffda RBX: 00007f14bf6a26d4 RCX: 000000000045c889 [ 615.535230][T22719] RDX: 0000000020000080 RSI: 000000004048ae9b RDI: 0000000000000008 [ 615.543233][T22719] RBP: 000000000076bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 615.551315][T22719] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000009 [ 615.559307][T22719] R13: 00000000000003c5 R14: 00000000004c6563 R15: 0000000000000000 19:29:46 executing program 2 (fault-call:9 fault-nth:1): socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4048ae9b, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 615.722409][T22719] ERROR: Out of memory at tomoyo_realpath_from_path. 19:29:46 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:46 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) [ 615.941572][T22735] FAULT_INJECTION: forcing a failure. [ 615.941572][T22735] name failslab, interval 1, probability 0, space 0, times 0 [ 615.954824][T22735] CPU: 1 PID: 22735 Comm: syz-executor.2 Not tainted 5.6.0-syzkaller #0 [ 615.963160][T22735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 615.973222][T22735] Call Trace: [ 615.976527][T22735] dump_stack+0x188/0x20d [ 615.980881][T22735] should_fail.cold+0x5/0xa [ 615.985406][T22735] ? fault_create_debugfs_attr+0x140/0x140 [ 615.991236][T22735] should_failslab+0x5/0xf [ 615.995669][T22735] __kmalloc+0x2d9/0x7a0 [ 615.999923][T22735] ? tomoyo_encode2.part.0+0xec/0x3b0 [ 616.005307][T22735] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 616.011132][T22735] tomoyo_encode2.part.0+0xec/0x3b0 [ 616.016347][T22735] ? lock_release+0x800/0x800 [ 616.021039][T22735] tomoyo_encode+0x28/0x50 [ 616.025472][T22735] tomoyo_realpath_from_path+0x184/0x620 [ 616.038684][T22735] tomoyo_path_number_perm+0x1c2/0x4d0 [ 616.044519][T22735] ? tomoyo_path_number_perm+0x17a/0x4d0 [ 616.050169][T22735] ? tomoyo_execute_permission+0x470/0x470 [ 616.056000][T22735] ? __fget_files+0x30d/0x500 [ 616.060711][T22735] ? selinux_file_mprotect+0x610/0x610 [ 616.066185][T22735] ? __fget_files+0x32f/0x500 [ 616.070886][T22735] ? ksys_dup3+0x3c0/0x3c0 [ 616.075320][T22735] ? __sb_end_write+0x101/0x1d0 [ 616.080189][T22735] ? vfs_write+0x161/0x5d0 [ 616.084627][T22735] security_file_ioctl+0x6c/0xb0 [ 616.089582][T22735] ksys_ioctl+0x50/0x180 [ 616.093855][T22735] __x64_sys_ioctl+0x6f/0xb0 [ 616.098457][T22735] ? lockdep_hardirqs_on+0x463/0x620 [ 616.103759][T22735] do_syscall_64+0xf6/0x7d0 [ 616.108293][T22735] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 616.114191][T22735] RIP: 0033:0x45c889 [ 616.119052][T22735] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 616.138659][T22735] RSP: 002b:00007f14bf6a1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 616.147339][T22735] RAX: ffffffffffffffda RBX: 00007f14bf6a26d4 RCX: 000000000045c889 [ 616.155319][T22735] RDX: 0000000020000080 RSI: 000000004048ae9b RDI: 0000000000000008 [ 616.163327][T22735] RBP: 000000000076bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 616.171304][T22735] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000009 [ 616.179283][T22735] R13: 00000000000003c5 R14: 00000000004c6563 R15: 0000000000000001 19:29:47 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:29:47 executing program 1 (fault-call:3 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:29:47 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x2) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) [ 616.466699][T22749] FAULT_INJECTION: forcing a failure. [ 616.466699][T22749] name failslab, interval 1, probability 0, space 0, times 0 [ 616.523191][T22749] CPU: 1 PID: 22749 Comm: syz-executor.1 Not tainted 5.6.0-syzkaller #0 [ 616.531564][T22749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 616.541635][T22749] Call Trace: [ 616.544949][T22749] dump_stack+0x188/0x20d [ 616.549311][T22749] should_fail.cold+0x5/0xa [ 616.553836][T22749] ? lock_downgrade+0x840/0x840 [ 616.558709][T22749] ? fault_create_debugfs_attr+0x140/0x140 [ 616.564542][T22749] should_failslab+0x5/0xf [ 616.568975][T22749] __kmalloc+0x2d9/0x7a0 [ 616.573240][T22749] ? __x64_sys_memfd_create+0x131/0x460 [ 616.578917][T22749] ? __this_cpu_preempt_check+0x28/0x190 [ 616.584565][T22749] ? __sb_end_write+0x101/0x1d0 [ 616.589445][T22749] ? strnlen_user+0x1f5/0x2e0 [ 616.594147][T22749] __x64_sys_memfd_create+0x131/0x460 [ 616.599532][T22749] ? ksys_write+0x1a5/0x250 [ 616.604053][T22749] ? memfd_fcntl+0x16f0/0x16f0 [ 616.608831][T22749] ? __ia32_sys_clock_settime+0x260/0x260 [ 616.614582][T22749] ? trace_hardirqs_off_caller+0x55/0x230 [ 616.620330][T22749] do_syscall_64+0xf6/0x7d0 [ 616.624862][T22749] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 616.630775][T22749] RIP: 0033:0x45c889 [ 616.634795][T22749] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 616.654416][T22749] RSP: 002b:00007f0d68e24a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 616.662850][T22749] RAX: ffffffffffffffda RBX: 00007f0d68e256d4 RCX: 000000000045c889 [ 616.670843][T22749] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1991 [ 616.678837][T22749] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000001 [ 616.686833][T22749] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 616.694825][T22749] R13: 0000000000000bdb R14: 00000000004cdfcc R15: 0000000000000000 [ 616.725270][T22735] ERROR: Out of memory at tomoyo_realpath_from_path. 19:29:47 executing program 5: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:47 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x3) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:29:48 executing program 4 (fault-call:22 fault-nth:0): dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4048ae9b, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:29:48 executing program 1 (fault-call:3 fault-nth:1): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:29:48 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x4) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:29:48 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0x5) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 617.103370][T22766] FAULT_INJECTION: forcing a failure. [ 617.103370][T22766] name failslab, interval 1, probability 0, space 0, times 0 [ 617.167040][T22766] CPU: 1 PID: 22766 Comm: syz-executor.1 Not tainted 5.6.0-syzkaller #0 [ 617.175416][T22766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 617.185481][T22766] Call Trace: [ 617.188799][T22766] dump_stack+0x188/0x20d [ 617.193157][T22766] should_fail.cold+0x5/0xa [ 617.197689][T22766] ? lock_downgrade+0x840/0x840 [ 617.203253][T22766] ? fault_create_debugfs_attr+0x140/0x140 [ 617.209082][T22766] ? shmem_destroy_inode+0x70/0x70 [ 617.214212][T22766] should_failslab+0x5/0xf [ 617.218642][T22766] kmem_cache_alloc+0x29b/0x740 [ 617.223512][T22766] ? find_held_lock+0x2d/0x110 [ 617.228294][T22766] ? __alloc_fd+0x46d/0x600 [ 617.232815][T22766] ? shmem_destroy_inode+0x70/0x70 [ 617.237939][T22766] shmem_alloc_inode+0x18/0x40 [ 617.242711][T22766] ? shmem_destroy_inode+0x70/0x70 [ 617.247835][T22766] alloc_inode+0x61/0x1e0 [ 617.252177][T22766] new_inode_pseudo+0x14/0xe0 [ 617.256866][T22766] new_inode+0x1b/0x40 [ 617.260952][T22766] shmem_get_inode+0x84/0x7e0 [ 617.265656][T22766] __shmem_file_setup.part.0+0x7a/0x2b0 [ 617.271228][T22766] shmem_file_setup+0x61/0x90 [ 617.275928][T22766] __x64_sys_memfd_create+0x28a/0x460 [ 617.281324][T22766] ? memfd_fcntl+0x16f0/0x16f0 [ 617.286109][T22766] ? __ia32_sys_clock_settime+0x260/0x260 [ 617.291850][T22766] ? trace_hardirqs_off_caller+0x55/0x230 [ 617.302643][T22766] do_syscall_64+0xf6/0x7d0 [ 617.307173][T22766] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 617.313075][T22766] RIP: 0033:0x45c889 [ 617.317601][T22766] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 617.337359][T22766] RSP: 002b:00007f0d68e24a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 617.345904][T22766] RAX: ffffffffffffffda RBX: 00007f0d68e256d4 RCX: 000000000045c889 [ 617.353972][T22766] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1991 19:29:48 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x5) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) [ 617.362077][T22766] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000001 [ 617.370061][T22766] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 617.379003][T22766] R13: 0000000000000bdb R14: 00000000004cdfcc R15: 0000000000000001 19:29:48 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x6) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:29:48 executing program 3: r0 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000040)={0xa0, 0x0, 0x2, {{0x5, 0x1, 0x1000, 0xf7, 0x8, 0x1f, {0x4, 0x3, 0x800, 0x8000, 0x1, 0x9, 0x1000, 0x5, 0x4, 0x444, 0x9, 0xffffffffffffffff, 0x0, 0x1, 0x1000}}, {0x0, 0x2}}}, 0xa0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 617.777511][T22774] FAULT_INJECTION: forcing a failure. [ 617.777511][T22774] name failslab, interval 1, probability 0, space 0, times 0 [ 617.829621][T22774] CPU: 0 PID: 22774 Comm: syz-executor.4 Not tainted 5.6.0-syzkaller #0 [ 617.837995][T22774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 617.848761][T22774] Call Trace: [ 617.852073][T22774] dump_stack+0x188/0x20d [ 617.856430][T22774] should_fail.cold+0x5/0xa [ 617.860953][T22774] ? lock_downgrade+0x840/0x840 [ 617.865827][T22774] ? fault_create_debugfs_attr+0x140/0x140 [ 617.871660][T22774] should_failslab+0x5/0xf [ 617.876090][T22774] kmem_cache_alloc+0x29b/0x740 [ 617.880955][T22774] ? getname_flags+0x1b/0x5b0 [ 617.885642][T22774] getname_flags+0xd2/0x5b0 [ 617.890156][T22774] ? trace_hardirqs_off_caller+0x55/0x230 [ 617.895892][T22774] __x64_sys_execve+0x6e/0xb0 [ 617.900585][T22774] do_syscall_64+0xf6/0x7d0 [ 617.905114][T22774] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 617.911020][T22774] RIP: 0033:0x45c889 [ 617.914932][T22774] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 617.934675][T22774] RSP: 002b:00007f9ce982bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 617.943102][T22774] RAX: ffffffffffffffda RBX: 00007f9ce982c6d4 RCX: 000000000045c889 [ 617.951088][T22774] RDX: 0000000020000780 RSI: 00000000200006c0 RDI: 0000000020000440 [ 617.959072][T22774] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 617.967057][T22774] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 19:29:49 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x7) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:29:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x2, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 617.975919][T22774] R13: 00000000000000a6 R14: 00000000004c33d1 R15: 0000000000000000 19:29:50 executing program 5 (fault-call:0 fault-nth:0): semget(0x3, 0x5, 0x0) 19:29:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:29:50 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x8) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:29:50 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x4, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:50 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x10, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:29:50 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x10) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) [ 619.133288][T22829] exFAT-fs (loop1): invalid boot record signature [ 619.143050][T22829] exFAT-fs (loop1): failed to recognize exfat type 19:29:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:29:50 executing program 5: semget(0x3, 0x5, 0x0) 19:29:50 executing program 5: semget(0x3, 0x4, 0x0) 19:29:50 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x48) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) [ 619.402126][T22847] exFAT-fs (loop1): invalid boot record signature [ 619.425139][T22847] exFAT-fs (loop1): failed to recognize exfat type 19:29:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:29:50 executing program 5: semget(0x3, 0x5, 0x6) 19:29:50 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x4c) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:29:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x1269, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 619.707271][T22868] exFAT-fs (loop1): invalid boot record signature [ 619.733923][T22868] exFAT-fs (loop1): failed to recognize exfat type 19:29:50 executing program 5: semget(0x3, 0x5, 0x600) 19:29:51 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='#ecurity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:29:51 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x68) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:29:51 executing program 5: semget(0x3, 0x5, 0x60000) 19:29:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x227f, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:29:51 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000180)=0x2) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5, 0x2}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, 0xffffffffffffffff) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000005c0)=[&(0x7f0000000000)='syz', &(0x7f0000000340)='cgroupppp1\'\x00', &(0x7f0000000400)='\x00', &(0x7f0000000600)='\xf8\'\xbe3\xce\x1c\xf6\xd6\x86\x92\x98\xda\x8f\x0f\x04\x05\x96-\x15\t\xf6+2\x9d\x9eX`\x92\x13\xbf_\xe3\xe8\x98\x05,\xf2N*\xfd]\x93\xdd\v\xb8\xa5\x84\x8c\xff\xe7\xaf\x02l\xd1\xb2\x1bH\x8a\x92\xda\xd0\x93RaBr\xc7\x8b\x04\x00\x00\x00\x00\x00\x00\x00&FH\"\xe9A', &(0x7f0000000580)=',selinux-$}{\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000900)='%\x00}\xe6\xacu\xbc\x0fV\xd6\xcb\xda\x8a\xae\xf0\x8a\xa3\nb\x90x\x8dCr\x1aH\xde\x8c\x83\xb7$\xa5\xb8\x90]6\xc9Gp\x89\xae\xd3\xdc\x02\x00\x00\x00\x00\x00\x00\x00\t\x13\xfdt,\xd8I*\xb9\xb4\xdb\x90-`!7\x10%\xe4\x05\xb9^M\x01\xb9\xc1\xb5\xf5z\xc2\xcdh6-GH\xf1\xfe\xe8\xe1\n\"\xabF>7\xf7\xfbW\x1a\x89S\xc5 \x8e\"\x9dR\xa0\x92c\xf0\x02F ffw\xe7K\"$\x81\xcc\xd5\x1f1\x97T\x01\xb1e\x9f\xf2\xa7\x17\xb8:\xc8?u\x10\xe1\xd4\xd2\\%\xda7(\xf2k\xd6\x06\x03\xc4\x87]hX\x9b\xc5\x18\x04\xd0\xbc\xf9*\xd7\xb1\x91s+k$\t\xeb\xe6\x7f\xd4\x85\x12w:c[\xb7:\xd25j\xcc\xd0\x05\xcf\xd2\r\xa1k#\x8e\"(\xc7\x0e\x1e\x86-\x19)\x88\xe8\xd7\xbf\x9cn\xca\x90\x04;(u^\x1e^\x91v~\xd8\xe4\xa3v\x82?\x02\xe5\xe9\b\xb0\xa6!\xd8\xeaCe:\x0f\xcc*A\xe4Cqao\xbd\x9c\x17\x84!\xb8\x1e~O@\xf2\neB\xa5\xb4\xda?\xe1\x1b\xa5Q**\x05k\x90\xe6ic90\xaa\xb3\xe1\xe4\xe10\xb9\x1a\x96\x10,\xd7z\x8c\x18&NJ\x9a\xc3\xfb\x17\xd2\xe2\xb3\x87\xc9\xe2`\xd5\x88\x1b\xc9\xf8\xfeg\x9e@\xf7La\x1bU0\xea$-\xaa\xa8)/\xd3f\xb7\x04\x9aO?\x8b`\x99S\xb4\x0f\x14\xaa\x13\xec\x97\\\x12J\xb2\x8a\xd3p\x82\x9bb\xa8\x83\x1e\xa6O\xd59OU\x8eBE\xdegD\xad\x9e\xd4\xe3\xb9H^[\x80\xff\xbf^\x98\xac\x8a\xf3\x85\x1f\xb5\x19\xb1d\xc6l\ta.\x98\xae\x06\xe3\xa7\xb4\xfbT\xd5|\'']) [ 620.751764][T22901] exFAT-fs (loop1): invalid boot record signature 19:29:51 executing program 5: semget(0x3, 0x5, 0x6000000000000) [ 620.868239][T22901] exFAT-fs (loop1): failed to recognize exfat type 19:29:52 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x6c) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:29:52 executing program 5: semget(0x3, 0x5, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r2, &(0x7f0000000280), 0xfffffed3) dup(r2) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r3, &(0x7f0000000280), 0xfffffed3) read$eventfd(r3, &(0x7f0000000080), 0x8) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x28800, 0x0) read$FUSE(r4, &(0x7f0000001280), 0x1000) ioctl$VT_ACTIVATE(r0, 0x5606, 0x15c) 19:29:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4b47, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:29:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:29:52 executing program 5: semget(0x1, 0x1, 0x4e7) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) accept4$ax25(r0, 0x0, &(0x7f0000000040), 0x80c00) prctl$PR_SET_DUMPABLE(0x4, 0x1) [ 621.294451][T22944] exFAT-fs (loop1): invalid boot record signature [ 621.306295][T22944] exFAT-fs (loop1): failed to recognize exfat type 19:29:52 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='%ecurity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:52 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x74) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:29:52 executing program 5: semget(0x3, 0x5, 0x0) r0 = semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT_ANY(r0, 0x8b502d37708aa057, 0x14, &(0x7f00000000c0)=""/55) semctl$IPC_RMID(r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000040)={'nat\x00', 0x0, 0x4, 0xae, [], 0x9, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000001280)=""/174}, &(0x7f0000000200)=0x78) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r2, &(0x7f0000000280), 0xfffffed3) ioctl$EVIOCGBITSND(r2, 0x80404532, &(0x7f0000000000)=""/43) 19:29:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:29:52 executing program 3: r0 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(r0, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4b49, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:29:52 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x7a) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) [ 621.790439][T22974] exFAT-fs (loop1): invalid boot record signature 19:29:53 executing program 5: semget(0x3, 0x5, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) setsockopt$inet6_tcp_int(r0, 0x6, 0x18, &(0x7f0000000000)=0xff, 0x4) [ 621.872813][T22974] exFAT-fs (loop1): failed to recognize exfat type 19:29:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:29:53 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)=0x1) semget(0x1, 0x47231888ca09d855, 0x80) 19:29:53 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0xfc) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:29:53 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='*ecurity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 622.237900][T22999] exFAT-fs (loop1): invalid boot record signature [ 622.261229][T22999] exFAT-fs (loop1): failed to recognize exfat type 19:29:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4c00, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:29:53 executing program 5: semget(0x3, 0x2, 0x7fe) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000000)={0x1f, @none}, 0x8) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000001280), 0x1000) ioctl$CAPI_NCCI_GETUNIT(r0, 0x80044327, &(0x7f0000000080)=0x3) umount2(&(0x7f0000000040)='./file0\x00', 0x7) 19:29:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:29:53 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x300) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:29:53 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:53 executing program 5: semget(0x3, 0x5, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) [ 622.658585][T23025] exFAT-fs (loop1): invalid boot record signature 19:29:53 executing program 5: semget(0x2, 0x0, 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000000)="5fc151ada46781c504ab85a257ae77d8fe76b55d9ed5df1cc220211603d34bfa0245c639994c1e2567ada314cf2bc9d17ea0fc019ab199defe652d0051b606124735f6faf2e28824ead709d4879e42c0123afdc7496a7b5cfd96") 19:29:53 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) read$alg(r0, &(0x7f0000000040)=""/4096, 0x1000) r1 = semget(0x3, 0x5, 0x22a) semctl$SETVAL(r1, 0x2, 0x10, &(0x7f0000000000)=0x5) [ 622.789882][T23025] exFAT-fs (loop1): failed to recognize exfat type 19:29:53 executing program 5: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000000016, &(0x7f00000004c0)) socket$packet(0x11, 0x3, 0x300) ptrace(0x4206, r0) ptrace(0x4203, r0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x4000000000000016, &(0x7f00000004c0)) ptrace(0x4206, r1) ptrace(0x4203, r1) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/ip_tables_targets\x00') read$FUSE(r2, &(0x7f0000000280), 0xfffffed3) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000000)=0x8) semget(0x3, 0x5, 0x0) 19:29:54 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x500) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:29:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) [ 623.188903][T23061] exFAT-fs (loop1): invalid boot record signature [ 623.196419][T23061] exFAT-fs (loop1): failed to recognize exfat type 19:29:54 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='+ecurity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4c01, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:29:54 executing program 5: semget(0x3, 0x5, 0x10) 19:29:54 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x600) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:29:54 executing program 3: r0 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000040)="3a9dd598323ccba827e9ffb60c4abc036df5563ee3aa62cf1846f91e4965ee41a783650eff9155aac454ff1aadb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e6020099db7f7f394eb5631320277022812bf544ea948912970981b684d622f287f62b2d34fe75a5a7c7a05698d3424bda2c9186f33fab43902ca7fda07d0325000000", 0xca, 0xfffffffffffffffb) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1, 0x8}, 0x0, 0x0, r0, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0xa, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:29:54 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x700) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) [ 623.478775][T23081] exFAT-fs (loop1): invalid boot record signature [ 623.517299][T23081] exFAT-fs (loop1): failed to recognize exfat type 19:29:54 executing program 5: semget(0x3, 0x3, 0x108) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x20, 0x0) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f0000000040)={[{0x3, 0x9, 0xfd, 0x0, 0xff, 0x5, 0x3, 0x2e, 0x6, 0x22, 0x5, 0xb8}, {0x8, 0xb903, 0x2, 0x4, 0x40, 0x3f, 0x1f, 0x2, 0x0, 0x5, 0x2, 0x80, 0x6e9}, {0x1, 0x2, 0x8, 0x2, 0x1, 0x9, 0x9, 0x40, 0x57, 0x7a, 0x1b, 0x3, 0x2}]}) 19:29:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0xb, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:29:54 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x4800) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:29:54 executing program 5: semget(0x3, 0x5, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) ioctl$SNDRV_PCM_IOCTL_DELAY(r0, 0x80084121, &(0x7f0000000000)) [ 623.854533][T23105] exFAT-fs (loop1): invalid boot record signature 19:29:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4c04, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 623.922996][T23105] exFAT-fs (loop1): failed to recognize exfat type 19:29:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0xc, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:29:55 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x4c00) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:29:55 executing program 5: semget(0x3, 0x3, 0x0) 19:29:55 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='-ecurity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:55 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x541b, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 624.692682][T23146] exFAT-fs (loop1): invalid boot record signature [ 624.723023][T23146] exFAT-fs (loop1): failed to recognize exfat type 19:29:55 executing program 5: semget(0x3, 0x5, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f00000000c0)=0x9) read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) r1 = fcntl$getown(r0, 0x9) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x2000, 0x0) ptrace$setregs(0xd, r1, 0xc6e, &(0x7f0000000000)="60d8e6a9a9faf49ba7ce1f87e42bfb294e1df42136f68a1f0cc0f2334facd14111b85a61889491148b1e3347cc560d24366915d2e3faa72cbda782fb59c6ab1ca511e94f06da9063116829743474380e32755b3d5f4a3a94a110e66bfb2cd7d66e1375d0b2e7d7bcc0f2a9fad11f26f9063c6f895d8434bf3c76bdace490b35ad6eb9d4b4502395b6ae7838cfe6924134686e28904bdffaddae10f80") 19:29:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0xe, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:29:56 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x6800) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:29:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x5421, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:29:56 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x6c00) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) [ 625.194392][T23167] exFAT-fs (loop1): invalid boot record signature [ 625.303300][T23167] exFAT-fs (loop1): failed to recognize exfat type 19:29:56 executing program 5: syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x2008c0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000000016, &(0x7f00000004c0)) ptrace(0x4206, r0) ptrace(0x4203, r0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r2, &(0x7f0000000280), 0xfffffed3) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x6, 0x4) read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x7, 0x45, 0x4, 0x3, 0x0, 0x3ff, 0x8202, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000040), 0x4}, 0x0, 0x7, 0x2, 0x7, 0x10000, 0x80dd, 0x9}, r0, 0xf, r1, 0x9) semget(0x3, 0x5, 0x0) 19:29:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x10, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:29:56 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x7400) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) [ 625.692884][T23205] exFAT-fs (loop1): invalid boot record signature [ 625.715436][T23205] exFAT-fs (loop1): failed to recognize exfat type 19:29:56 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='.ecurity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:56 executing program 5: semget(0x3, 0x5, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000000)={0x66e, 0xb, 0x4, 0x4, 0x1f, {}, {0x2, 0xc, 0xff, 0x0, 0x5, 0x2, "82c5aeeb"}, 0x5, 0x1, @offset=0x36e9626, 0x1f, 0x0, r1}) setsockopt$inet6_buf(r2, 0x29, 0x3d, &(0x7f0000000080)="6d123e15e815cab30b7dab3a46191fa646db21aa296b34a13806b55a588230cc9bd718580265344e4c568fa2e1b9e992af26224ae0437ff96da66984a8373411b15a59bd778863da3b2cb42905137fa26066870d34f5e85d7e4a9f462c27c1a932c47003694667788914fb8bd27e595e5b4eaa16b86b2479afb5f27ef43d8b9f6b669d6252bbbf2f835762d49dda3c6788399bc017954fac35ff3ea4b39f6b8d784e30353ea5d9579f8c9d32a67aed6ef714ffde14bdddd2dcbb4922ee6258924ca393cc4b1697c3eaa52f06bc480278e9ee9a9d3352499c20527a9a6e36a9d3c8f55048b7b833f54df74d7560fbe23a81d482d7f4a25c6a95", 0xf9) 19:29:57 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xfffb) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:57 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x7a00) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:29:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x5450, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:29:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x18, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:29:57 executing program 5: semget(0x3, 0x5, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000000)='l2tp\x00') 19:29:57 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='0ecurity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 626.187529][T23235] exFAT-fs (loop1): invalid boot record signature [ 626.199451][T23235] exFAT-fs (loop1): failed to recognize exfat type 19:29:57 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='stack\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) semget(0x3, 0x5, 0x0) 19:29:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x23, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:29:57 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x80fe) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:29:57 executing program 5: semget(0x0, 0x5, 0x0) 19:29:57 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f0000000040)={0x1, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4007, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000, 0x2, @perf_config_ext={0xffff, 0x2}, 0x0, 0x0, 0x0, 0x8, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x3) getpgrp(0x0) setpriority(0x0, 0x0, 0x1) r0 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r0) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 626.489029][T23258] exFAT-fs (loop1): invalid boot record signature [ 626.498672][T23258] exFAT-fs (loop1): failed to recognize exfat type 19:29:57 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0xc0fe) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:29:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x5451, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:29:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x48, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:29:57 executing program 5: semget(0x3, 0x5, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000000)) 19:29:57 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x2500, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, 0xffffffffffffffff) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:57 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0xfc00) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) [ 626.862491][T23287] exFAT-fs (loop1): invalid boot record signature [ 626.887985][T23287] exFAT-fs (loop1): failed to recognize exfat type 19:29:58 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='Xecurity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:58 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000000)='system_u:object_r:semanage_read_lock_t:s0\x00', 0x2a) semget(0x3, 0x5, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x11, 0x777e, 0x9, "751cd7676f5de1162914a97a0bf52fa8c3f53515d8fd0f11a5913d3c4bc7efc5"}) 19:29:58 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0xfe80) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:29:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x4c, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:29:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x5452, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:29:58 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000340)={0x0, 0xfb, 0xed, 0x4, 0xfb, "ac7b1b05e663628c00b67ad03e33eea5", "65afb8e3359c23b988cf1d430415dd47ab35526992056c2919c8aa40d3327e743b887755c333f397410dc4a9e143e018a1c1a6399e4143f5d38c3065ce5bc3ca9f1bab66f4070ffeb85eba344c1be615c1592218d7180e893eae2243c8d66fba0fd31646f27dbf3cab60b81e8b2a8af533625801d54c86a41685e7bb6c19b4e114e7af9eb7f961cda131dbfb9a987b8b3ecbdb43a1161cd49e581532c77c8a79645676b2e5cea4ce19d018a64b631cf7299d68c77c8604a911c2d65cf856c5c28740cdb96a4136d299824b3b49d664902f2692dc613572a1"}, 0xed, 0x1) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:58 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) connect$ax25(r1, &(0x7f0000000000)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r4}, 0x10) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={r4, 0x5}, &(0x7f00000000c0)=0x8) 19:29:58 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0xfec0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) [ 627.567950][T23329] exFAT-fs (loop1): invalid boot record signature 19:29:58 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='\\ecurity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 627.609621][T23329] exFAT-fs (loop1): failed to recognize exfat type 19:29:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x5460, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:29:58 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(r0, &(0x7f0000000180), 0x0, 0x5) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x77, 0x0, 0x407f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x5, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:58 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0xff00) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:29:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x60, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:29:59 executing program 5: semget(0x3, 0x5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r0) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)={{0x1, 0x0, 0x0, r0, r1, 0x4, 0x7f}, 0x101, 0x7, 0x10001, 0xffff, r2, r3, 0x7fff}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgrp(0x0) setpriority(0x0, r7, 0xffff) r8 = getpgrp(0x0) setpriority(0x0, r8, 0xffff) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)={{0x1, 0x0, 0x0, r5, r6, 0x4, 0x7f}, 0x101, 0x7, 0x10001, 0xffff, r7, r8, 0x7fff}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000000)={{0x0, 0x0, r1, r4, r6, 0x84, 0xb483}, 0x80, 0x401, 0x0, 0x0, 0x0, 0x0, 0xd326}) 19:29:59 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x100000) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) [ 628.146660][T23375] exFAT-fs (loop1): invalid boot record signature [ 628.204586][T23375] exFAT-fs (loop1): failed to recognize exfat type 19:29:59 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x1000000) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:29:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x6364, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:29:59 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='cecurity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:29:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x68, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:29:59 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x2000000) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) [ 628.644141][T23402] exFAT-fs (loop1): invalid boot record signature [ 628.667354][T23402] exFAT-fs (loop1): failed to recognize exfat type 19:29:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x6c, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:29:59 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x3000000) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) [ 628.999522][T23421] exFAT-fs (loop1): invalid boot record signature [ 629.169091][T23421] exFAT-fs (loop1): failed to recognize exfat type 19:30:00 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x4000000) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:30:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x7709, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:30:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x74, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:00 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000340)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cff4e1f91e4965ee41a78365ffadbacfbc8c939226adb52eb2e7fe9eb197e03d8f041f892f0c27fb5db2c5f9a2ef39b5a4e7402b7c6d3b64f23c07a5fb45b760b9a8a513c4e94b4e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb5631300000000000000000021000000000000000000000826a6bd75135c93db25e4dc8d868788c9fc33c3e7a3e2b73fd8d670747e7f727220f6917a3d617512a78abcf6d75327a14daee01b37fb3d601d4ebd45b566f70fd50288e708b69b", 0x124, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000900)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 629.652232][T23442] exFAT-fs (loop1): invalid boot record signature 19:30:00 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x5000000) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) [ 629.734441][T23442] exFAT-fs (loop1): failed to recognize exfat type 19:30:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x7a, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x8912, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 630.182897][T23469] exFAT-fs (loop1): invalid boot record signature [ 630.210162][T23469] exFAT-fs (loop1): failed to recognize exfat type 19:30:01 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='decurity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:01 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x6000000) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:30:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:01 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_bp={&(0x7f0000000040), 0x4}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x8914, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:30:02 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x7000000) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) [ 630.839495][T23497] exFAT-fs (loop1): invalid boot record signature [ 630.862194][T23497] exFAT-fs (loop1): failed to recognize exfat type 19:30:02 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x8000000) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:30:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x42c, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x8933, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:30:02 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x48000000) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) [ 631.318087][T23523] exFAT-fs (loop1): invalid boot record signature [ 631.365001][T23523] exFAT-fs (loop1): failed to recognize exfat type 19:30:02 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x4c000000) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:30:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x466, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:02 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='iecurity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x89a0, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 631.756500][T23553] exFAT-fs (loop1): invalid boot record signature [ 631.871624][T23553] exFAT-fs (loop1): failed to recognize exfat type 19:30:03 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x68000000) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:30:04 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x408000, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x2, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000180)='securityppp1\x00', &(0x7f00000003c0)='\x00\x001\x8a|\xbf0\xba\xeb\xc2\xea\xd2\xa7\xd5\x99\th\x88\xd9=7\"\\p\xe9\xecV\xd5&8\x85\x95t\x8e\x8f\xfdI\xab\xa8\xbd\xdb8D\x8d\xcd', &(0x7f0000000400)='securityppp1\x00', &(0x7f0000000580)='\x00\x001\x8a|\xbf0\xba\xeb\xc2\xea\xd2\xa7\xd5\x99\th\x88\xd9=7\"\\p\xe9\xecV\xd5&8\x85\x95t\x8e\x8f\xfdI\xab\xa8\xbd\xdb8D\x8d\xcd', &(0x7f00000005c0)='\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='\x00'], &(0x7f0000000340)=[&(0x7f0000000040)='securityppp1\x00', &(0x7f0000000080)='(vmnet1\x9bposix_a\x1a\xeb\x00\x00ccess+(vboxnet0loGPL&\x00', &(0x7f0000000380)='syz', &(0x7f0000000100)='syz', &(0x7f00000000c0)='\x00\x001\x8a|\xbf0\xba\xeb\xc2\xea\xd2\xa7\xd5\x99\th\x88\xd9=7\"\\p\xe9\xecV\xd5&8\x85\x95t\x8e\x8f\xfdI\xab\xa8\xbd\xdb8D\x8d\xcd']) 19:30:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x89a1, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:30:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x467, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:04 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x6c000000) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:30:04 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sysvipc/shm\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x7) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r3, &(0x7f0000000280), 0xfffffed3) accept(r3, &(0x7f00000000c0)=@ipx, &(0x7f00000001c0)=0x80) r4 = socket$inet6(0xa, 0x3, 0x7) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) r5 = dup(r4) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_GET_CTX(r2, 0xc0086423, &(0x7f0000000180)={r6}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000040)={r6, 0x3}) write$sndseq(0xffffffffffffffff, &(0x7f0000000000)=[{0x3f, 0xd, 0x7, 0x4, @time={0x100, 0x1}, {0x3, 0x4}, {0x3, 0x6}, @addr={0x80, 0x2}}], 0x1c) semget(0x3, 0x5, 0x0) 19:30:04 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x74000000) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:30:04 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='lecurity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 633.723946][T23593] exFAT-fs (loop1): invalid boot record signature 19:30:04 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) sendmsg$NFQNL_MSG_VERDICT_BATCH(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x3, 0x3, 0x801, 0x0, 0x0, {0xf, 0x0, 0x2}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x20}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffe, 0x9}}, @NFQA_VERDICT_HDR={0xc, 0x2, {0x0, 0x3fac}}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) semget(0x3, 0x5, 0x0) [ 633.836933][T23593] exFAT-fs (loop1): failed to recognize exfat type 19:30:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0xae01, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:30:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x468, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:05 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x7a000000) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:30:05 executing program 5: semget(0x3, 0x5, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f0000000040)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x31b) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x8900, &(0x7f0000000200)={&(0x7f0000000740)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2b837}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x1, 'wireguard\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x40}}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r2, &(0x7f0000000280), 0xfffffed3) getsockopt$inet6_mreq(r2, 0x29, 0x15, &(0x7f0000000180)={@mcast2, 0x0}, &(0x7f00000001c0)=0x14) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0xffffffffffffffef, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x31b) sendmsg$nl_route(r4, &(0x7f0000000680)={0x0, 0x8900, &(0x7f0000000200)={&(0x7f0000000740)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2b837}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x1, 'wireguard\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x40}}, 0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f00000002c0)=0x0, &(0x7f0000000300)=0x4) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0xffffffffffffffef, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x31b) sendmsg$nl_route(r8, &(0x7f0000000680)={0x0, 0x8900, &(0x7f0000000200)={&(0x7f0000000740)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2b837}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x1, 'wireguard\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x40}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000880)={&(0x7f0000000340)={0x53c, 0x0, 0x8, 0x70bd28, 0x25dfdbff, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x8ef}}}]}}, {{0x8}, {0x240, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x800}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x24, 0x4, [{0x2, 0x9e, 0x0, 0xffffffff}, {0xff, 0x20, 0x4, 0x3}, {0x7ff, 0x7, 0x8b, 0x3f}, {0x1ff, 0x87, 0x81, 0x5}]}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x8000}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xb, 0x4, 'random\x00'}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}]}}, {{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8}}, {0x8, 0x6, r1}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x1468}}}]}}, {{0x8, 0x1, r3}, {0x4}}, {{0x8, 0x1, r6}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r7}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r10}, {0xf8, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8}}}]}}]}, 0x53c}, 0x1, 0x0, 0x0, 0x10880}, 0x4040080) [ 634.344021][T23625] exFAT-fs (loop1): invalid boot record signature [ 634.383591][T23625] exFAT-fs (loop1): failed to recognize exfat type 19:30:05 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0xfc000000) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:30:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0xae80, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:30:05 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0xfffffffffffffffe, 0x0, 0x7, 0x1, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:05 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='oecurity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:06 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0xfe800000) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:30:06 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0xfec00000) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:30:06 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(r0, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x10000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.\xc9kB\xedbility\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x469, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:06 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0xff000000) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) [ 635.620682][T23692] exFAT-fs (loop1): invalid boot record signature [ 635.636476][T23692] exFAT-fs (loop1): failed to recognize exfat type 19:30:06 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r2, &(0x7f0000000280), 0xfffffed3) accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001280)=0x14) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r3, &(0x7f0000000280), 0xfffffed3) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f00000002c0)={r3, 0x9, 0x1, "504f61e19e8f76bcb77e2904f19c8c2d6971d5643ab81671a267da4945af020d73d6a0a92601722dc18bdafbc1cb39b4cf2e20c848e8e47927442057020d428649d0651657967078496b47f08a29cfab6e8603172faf09184292e056768d7980c521509b21b13b42d08622025fdcfad2825fdaf07de2803772a89c807579b795b9140cbca49b2a089aa36c776d26623a026ec3534988c0b86edf62e1e4440220ad64a7c36e68041fdd8fdf7d520b4118ea325520cfcba3c1722858a32878a13208fd8a83b6"}) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000080)={0x1, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {0x0, 0x0, 0x0, [], 0x80}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {0x0, 0x0, 0x0, [], 0x5}, {}, {0x80, 0x0, 0x0, [], 0x8}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x3f, 0x0, [], 0x1}, {0x7}]}}) 19:30:06 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='pecurity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:08 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:08 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0xfe, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:30:08 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='tecurity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x400454ca, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:30:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x46a, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:08 executing program 5: semget(0x0, 0x3, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000400)={'vlan0\x00', &(0x7f0000000300)=@ethtool_drvinfo={0x3, "6fb5505ff25309e2b155495ff5ba1ea5cce5a4017d36aa2c8994926f5bdab942", "cffa10a7ef5d9ecb564731a2c668d08401000100000000000022000000000600", "c5eaf986ab6bcbf8a717559c3fe596abd9ffb6c5de0771a0552cd7e5408e326a", "d5e3645fc757efdca59be79a8e5105f911028ed583a8959b98f005c0a9df43a4", "541bff7cbf8fdcc8cb16f2d1ef2408f5e42d9a1e60ea1ad5bffa7628392e618c", "939c00"}}) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r3, &(0x7f0000000280), 0xfffffed3) ioctl$VIDIOC_S_AUDOUT(r3, 0x40345632, &(0x7f00000000c0)={0x894b, "7aa41c5104cfd8257509dea27f4126f62fc9551bfda8d98096e315fd5307d24f", 0x2, 0x1}) read$FUSE(r2, &(0x7f0000000280), 0xfffffed3) ioctl$SNDRV_TIMER_IOCTL_STATUS32(r2, 0x80585414, &(0x7f0000000040)) signalfd(r1, &(0x7f0000000000)={[0x6]}, 0x8) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r4, &(0x7f0000000280), 0xfffffed3) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r4, 0x4020565b, &(0x7f0000000140)={0x8001001, 0x7fff, 0x2}) 19:30:08 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x2, 0xffff, 0x1, 0x100, 0x0, [{0xff, 0x2, 0x1, [], 0x9}, {0xc9, 0x1, 0x81, [], 0x6}, {0x1, 0x80, 0x7, [], 0x7}, {0x1f, 0x0, 0xad, [], 0xff}, {0x97, 0xff, 0xbf, [], 0x7}, {0x3f, 0x81, 0x0, [], 0x7f}, {0x7f, 0x2, 0x6, [], 0x92}, {0x81, 0x0, 0x74, [], 0xf7}, {0x6e, 0x3, 0xee, [], 0x27}, {0x0, 0x1f, 0x6}, {0x9, 0x3f, 0x4, [], 0x1f}, {0x81, 0x0, 0x2, [], 0xff}, {0xee, 0xff, 0x3, [], 0x22}, {0x6, 0x3c, 0x8, [], 0x40}, {0x52, 0x6, 0x9}, {0xfa, 0xb1, 0x38, [], 0x7}, {0x2, 0x76, 0xff, [], 0x1}, {0x9, 0x80, 0x1, [], 0x20}, {0x1, 0x7f, 0x9}, {0x2b, 0x4, 0x1, [], 0x35}, {0x1f, 0x0, 0x9}, {0x0, 0x9, 0x4, [], 0x4}, {0x80, 0x0, 0x5, [], 0x9}, {0x5, 0xaf, 0xe1, [], 0x4}]}}) [ 637.136818][T23740] exFAT-fs (loop1): invalid boot record signature [ 637.161451][T23740] exFAT-fs (loop1): failed to recognize exfat type 19:30:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x40049409, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:30:08 executing program 5: semget(0x1, 0x5, 0x42) 19:30:08 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4400a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x46b, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:08 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xfe, 0x0, 0x81}, {0x3, 0x0, 0x8}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {0x0, 0x0, 0x0, [], 0x1}, {0x1, 0x1, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {}, {0x20, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x8, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x1c, [], 0x81}, {}, {0x0, 0x80}, {0x0, 0x69, 0xfb}, {0x9}, {0x80, 0x2, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x1, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x1}, {0x0, 0x3, 0x0, [], 0x1}, {0x7}]}}) 19:30:08 executing program 5: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000000016, &(0x7f00000004c0)) ptrace(0x4206, r0) ptrace(0x4203, r0) waitid(0x0, r0, &(0x7f0000000000), 0x80000000, &(0x7f0000000080)) semget(0x3, 0x5, 0x0) [ 637.662587][T23776] exFAT-fs (loop1): invalid boot record signature [ 637.697195][T23776] exFAT-fs (loop1): failed to recognize exfat type 19:30:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x46c, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) [ 638.018247][T23795] exFAT-fs (loop1): invalid boot record signature [ 638.044861][T23795] exFAT-fs (loop1): failed to recognize exfat type 19:30:09 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='uecurity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4004ae86, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:30:09 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) r1 = dup2(r0, r0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000001680)={&(0x7f0000001640)={0x14, r3, 0xd9b5f1a1c3ebb627}, 0x14}, 0x1, 0x0, 0x0, 0x4000010}, 0x20000000) sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x28, r3, 0x800, 0x70bd29, 0x25dfdbff, {}, [@SEG6_ATTR_DST={0x14, 0x1, @dev={0xfe, 0x80, [], 0x2f}}]}, 0x28}}, 0x880) listen(r0, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000000)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:qemu_device_t:s0\x00', 0x23, 0x1) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x10, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x81}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:30:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x46d, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:09 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x105000) fsetxattr$security_evm(r0, &(0x7f0000000100)='security.evm\x00', &(0x7f0000000140)=@sha1={0x1, "9275ea4087aa449a17b721d33180dde3bebbab95"}, 0x15, 0x2) r1 = semget(0x3, 0x5, 0x206) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffffef, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x31b) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x8900, &(0x7f0000000200)={&(0x7f0000000740)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2b837}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x1, 'wireguard\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x40}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'batadv_slave_0\x00', r2}) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0xffffffffffffffef, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x31b) sendmsg$nl_route(r4, &(0x7f0000000680)={0x0, 0x8900, &(0x7f0000000200)={&(0x7f0000000740)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2b837}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x1, 'wireguard\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x40}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0xffffffffffffffef, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x31b) sendmsg$nl_route(r7, &(0x7f0000000680)={0x0, 0x8900, &(0x7f0000000200)={&(0x7f0000000740)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2b837}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x1, 'wireguard\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r9}]}, 0x40}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000012c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000001280)={&(0x7f0000000dc0)={0x48c, 0x0, 0x200, 0x70bd26, 0x25dfdbfb, {}, [{{0x8}, {0xe4, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x3c, 0x4, [{0x2, 0xa, 0xfc, 0x8001}, {0xca, 0xc0, 0xfd, 0x7}, {0xc503, 0x1f, 0x0, 0x4}, {0x9, 0x4, 0x6}, {0x81, 0x5, 0x5, 0x1}, {0x1, 0x8, 0xf8, 0x2}, {0x2, 0x70, 0x8, 0x6}]}}}]}}, {{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8}, {0xac, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0xa4000000}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x2061bd49}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x2}}}]}}, {{0x8}, {0xac, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0xb8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0xc, 0x4, [{0xb0a, 0x3, 0xa9, 0x9}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0xcc, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x8001}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r6}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r9}}}]}}]}, 0x48c}}, 0x8002001) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) semtimedop(r1, &(0x7f0000000000)=[{0x4, 0x1b, 0x800}, {0x0, 0x5, 0x800}, {0x2, 0x200}, {0x4, 0x8}, {0x1, 0x14b, 0x1000}, {0x4, 0x4, 0x1000}], 0x6, &(0x7f0000000080)={r10, r11+10000000}) [ 638.339819][ T26] audit: type=1400 audit(1586633409.448:29): avc: denied { relabelto } for pid=23803 comm="syz-executor.0" name="MPTCPv6" dev="sockfs" ino=153528 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:qemu_device_t:s0 tclass=rawip_socket permissive=1 19:30:09 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x20, 0x0, 0x0, 0x7, 0x1}, 0x0, 0xf, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 638.413602][T23814] exFAT-fs (loop1): invalid boot record signature [ 638.420528][T23814] exFAT-fs (loop1): failed to recognize exfat type 19:30:09 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, 0x0) r2 = eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000080)={0x1, r2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0xc0) ftruncate(r5, 0x200004) sendfile(r2, r5, 0x0, 0xf10000) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:30:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4004ae8b, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:30:10 executing program 3: r0 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(r0, 0x4004ae86, &(0x7f0000000040)=0x8000) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x1, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, r2) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x241, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x46e, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4004ae99, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:30:10 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='xecurity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 639.934028][T23893] exFAT-fs (loop1): invalid boot record signature [ 639.948436][T23893] exFAT-fs (loop1): failed to recognize exfat type 19:30:11 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x8, &(0x7f00000008c0)=0xa010000040000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x4, @perf_config_ext={0x5, 0x10000}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x9, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f00000000c0)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000040)='E\x00\x93\x9b/3AX\x04\xee\x9fCU\x0f\xf9)\'\xb4\'\xb9\xae\x92\x16\x9f&s\xa2e\x91\xfdD\x1f\xf1\x1a\xb5\xa4\xe3~_\xd6\xe3\xdc\xb3\xae)\\\x8b\xca.{\x82\xfao\xa6\xd6\xa9\xc8\xdaO\xf5\xb6\xe5\xac\xcb\x80\x8b\xa1\x81\xa3\xa489P\x0fBu\xf8\x13LZpQ']) 19:30:11 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x100000, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x46f, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:11 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) r1 = socket$nl_generic(0x10, 0x3, 0x10) shutdown(r1, 0x1) [ 640.497478][T23919] exFAT-fs (loop1): invalid boot record signature 19:30:11 executing program 5: semget(0x3, 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000000)=[0x63, 0x8]) [ 640.583471][T23919] exFAT-fs (loop1): failed to recognize exfat type 19:30:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x40086602, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:30:11 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='s\acurity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:11 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r3}, 0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000000)={r3, 0x8}, &(0x7f00000002c0)=0x8) 19:30:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x470, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:12 executing program 5: semget(0x3, 0x5, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000040)={0x2, 0x5000, 0x6, 0xfff, 0xffffff5d}) read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000000)={'wg0\x00'}) 19:30:12 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x40, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r3, &(0x7f0000000280), 0xfffffed3) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r6}, 0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000001280)={0x5, 0x0, 0x5, 0x7, 0x2, 0x4, 0x8, 0x3, r6}, &(0x7f00000012c0)=0x20) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000001300)={r7, @in={{0x2, 0x4e21, @loopback}}}, 0x84) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f00000013c0)=""/4096) [ 641.056762][T23950] exFAT-fs (loop1): invalid boot record signature [ 641.076913][T23950] exFAT-fs (loop1): failed to recognize exfat type 19:30:12 executing program 5: semget(0x3, 0x5, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x550a) r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_mreqsrc(r0, 0x0, 0x26, &(0x7f0000000000)={@loopback, @initdev, @multicast2}, &(0x7f0000000040)=0xc) 19:30:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x471, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) [ 641.386029][T23977] exFAT-fs (loop1): invalid boot record signature [ 641.397613][T23977] exFAT-fs (loop1): failed to recognize exfat type 19:30:12 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:12 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x40087602, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:30:12 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x1) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:30:12 executing program 5: semget(0x3, 0x5, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$VIDIOC_ENUMAUDIO(r0, 0xc0345641, &(0x7f0000000080)={0x4, "ad576009bdd13e0e46bbb3533c387615fcd14a5c48fb3532fa8f1a5fb83b158c", 0x1, 0x1}) read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) 19:30:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x500, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:12 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='s%curity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:12 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x5, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x2, [], 0xd7}, {0x0, 0xfc, 0x7, [], 0x6}, {0x4}, {0x0, 0x1f, 0x2, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x1, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) [ 641.636155][T23996] exFAT-fs (loop1): invalid boot record signature [ 641.715494][T23996] exFAT-fs (loop1): failed to recognize exfat type 19:30:12 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4, [], 0x3b}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0xaa, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {0x4}, {}, {0x80, 0x0, 0x0, [], 0x7}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:30:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x600, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) [ 641.937212][T24015] exFAT-fs (loop1): invalid boot record signature [ 641.943978][T24015] exFAT-fs (loop1): failed to recognize exfat type 19:30:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x40186366, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:30:13 executing program 5: r0 = semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT_ANY(r0, 0x8b502d37708aa057, 0x14, &(0x7f00000000c0)=""/55) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) r5 = getpgrp(0x0) setpriority(0x0, r5, 0xffff) ptrace(0x4206, 0x0) ptrace(0x4203, 0x0) ptrace$setsig(0x4203, 0x0, 0x2, &(0x7f00000002c0)={0x22, 0x0, 0x40}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)={{0x1, 0x0, 0x0, r2, r3, 0x4, 0x7f}, 0x101, 0x7, 0x10001, 0xffff, r4, r5, 0x7fff}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) r7 = getgid() semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000000)={{0x0, r1, r3, r6, r7, 0x160, 0x1}, 0x4, 0xffffffffffff0001, 0x0, 0x0, 0x0, 0x0, 0x1f}) semget(0x3, 0x5, 0x0) 19:30:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x700, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) [ 642.247782][T24034] exFAT-fs (loop1): invalid boot record signature [ 642.264184][T24034] exFAT-fs (loop1): failed to recognize exfat type 19:30:13 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000040)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000006c0), &(0x7f0000000580)=[&(0x7f0000000080)='\x00', &(0x7f00000000c0), &(0x7f0000000100)='vboxnet0*:vboxnet1lo.trustedppp1\x00', &(0x7f0000000180)='!/-\x00', &(0x7f0000000340)='syz', &(0x7f00000000c0)='em1@md5sumeth1em1[+vboxnet0-wlan0{**{em1wlan0\'&GPLself$@\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='syz', &(0x7f0000000440)='user\x00']) 19:30:13 executing program 0: connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(0xffffffffffffffff, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) r1 = syz_open_dev$vcsa(&(0x7f0000001280)='/dev/vcsa#\x00', 0xffffffff, 0x200) setsockopt$inet_dccp_int(r1, 0x21, 0x3, &(0x7f00000012c0)=0x2, 0x4) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x41, 0x0) ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f00000002c0)={[{0x0, 0x5, 0x1, 0x5, 0xf9, 0x6, 0x5, 0x4, 0xc0, 0x4, 0x81, 0x0, 0x81}, {0x1, 0x1, 0x3, 0x80, 0xb6, 0x1f, 0x7f, 0x1, 0x8, 0x9, 0x4, 0x6, 0x2}, {0x14320000, 0x58b, 0x12, 0x0, 0x40, 0x1, 0x5, 0x5, 0x20, 0x2, 0x20, 0x8, 0x1}], 0x2}) 19:30:13 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='s\\curity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x900, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4020940d, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 642.671810][T24055] exFAT-fs (loop1): invalid boot record signature [ 642.678282][T24055] exFAT-fs (loop1): failed to recognize exfat type 19:30:13 executing program 0: socket$inet6_dccp(0xa, 0x6, 0x0) socket$bt_rfcomm(0x1f, 0x1, 0x3) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000001280)='/dev/dlm_plock\x00', 0x200000, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(r0, 0xc2604111, &(0x7f00000012c0)={0x7ff, [[0x7, 0x7f, 0x9, 0x4, 0x9, 0x9, 0x4, 0x2], [0x3, 0x1, 0x227, 0x8, 0x401, 0xffffffff, 0x1], [0xca, 0x1, 0x401, 0x7, 0x8, 0x8000, 0x4, 0x9]], [], [{0x800, 0x4, 0x0, 0x1}, {0x8000, 0x5, 0x1, 0x0, 0x0, 0x1}, {0x9, 0x9, 0x1, 0x1, 0x1}, {0xffffffff, 0x9, 0x1, 0x0, 0x1, 0x1}, {0x0, 0xffffff5a, 0x0, 0x0, 0x1, 0x1}, {0x3, 0x7, 0x0, 0x1, 0x1, 0x1}, {0x7fffffff, 0x9198, 0x0, 0x0, 0x1}, {0x0, 0x6, 0x0, 0x1}, {0x8001, 0x428, 0x1, 0x1, 0x0, 0x1}, {0x401, 0x3, 0x1, 0x0, 0x0, 0x1}, {0x996, 0x1, 0x0, 0x0, 0x0, 0x1}, {0xff, 0x8, 0x1, 0x0, 0x0, 0x1}], [], 0x67a}) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r2, &(0x7f0000000280), 0xfffffed3) sendmsg$IPCTNL_MSG_CT_GET_DYING(r2, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x6, 0x1, 0x301, 0x0, 0x0, {0xa, 0x0, 0xa}, ["", "", "", ""]}, 0x14}}, 0x800) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r3, &(0x7f0000000280), 0xfffffed3) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r4, &(0x7f0000000280), 0xfffffed3) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0)='nl80211\x00') r6 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x30, r5, 0x11, 0x0, 0x0, {}, [@NL80211_ATTR_WIPHY_NAME={0x14, 0x2, 'bridge0\x00'}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}]}, 0x30}}, 0x0) sendmsg$NL80211_CMD_NEW_MPATH(r4, &(0x7f0000001600)={&(0x7f0000001540)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000015c0)={&(0x7f0000001580)={0x20, r5, 0x200, 0x70bd26, 0x25dfdbfc, {}, [@NL80211_ATTR_MAC={0xa, 0x6, @multicast}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty, 0x10001}, 0x1c) listen(r1, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:30:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0xa00, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) [ 643.015528][ T26] audit: type=1400 audit(1586633414.128:30): avc: denied { create } for pid=24069 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dccp_socket permissive=1 19:30:14 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x4, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) [ 643.124560][T24073] exFAT-fs (loop1): invalid boot record signature [ 643.174019][T24073] exFAT-fs (loop1): failed to recognize exfat type 19:30:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4090ae82, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:30:14 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='sycurity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:14 executing program 3: r0 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x1, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0xfff}, 0x0, 0x0, r0, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0xb00, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:14 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) accept(r1, &(0x7f00000002c0)=@pppoe={0x18, 0x0, {0x0, @remote}}, &(0x7f0000000000)=0x80) [ 643.591814][T24100] exFAT-fs (loop1): invalid boot record signature [ 643.598351][T24100] exFAT-fs (loop1): failed to recognize exfat type 19:30:15 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x80203, 0x0) ioctl$SG_SCSI_RESET(r1, 0x2284, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r2, &(0x7f0000000280), 0xfffffed3) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee1, &(0x7f0000000340)={0x0, 0x3f, 0x1, &(0x7f0000000300)=0x1}) poll(&(0x7f00000002c0)=[{r1, 0x8100}], 0x1, 0x2) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4003, 0x0, @empty}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r3, &(0x7f0000000280), 0xfffffed3) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r4, &(0x7f0000000280), 0xfffffed3) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000001280)={0x0, 0x94e}, &(0x7f00000012c0)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000001300)={0x3, 0x4, 0x0, 0x3ff, r5}, 0x10) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r6, &(0x7f0000000280), 0xfffffed3) fallocate(r6, 0x14, 0x3, 0x2) 19:30:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4138ae84, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:30:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0xb70, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) [ 644.091332][T24126] exFAT-fs (loop1): invalid boot record signature [ 644.123279][T24126] exFAT-fs (loop1): failed to recognize exfat type 19:30:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0xb71, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:15 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r3, &(0x7f0000000280), 0xfffffed3) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000340)={0x7, 0x9, 0x4, 0x4000, 0x3, {r1, r2/1000+10000}, {0x2, 0x1, 0xff, 0xff, 0x56, 0x6, "ea1db6d7"}, 0x2, 0x3, @offset=0x26000000, 0x8, 0x0, r3}) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0)='nl80211\x00') r6 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x30, r5, 0x11, 0x0, 0x0, {}, [@NL80211_ATTR_WIPHY_NAME={0x14, 0x2, 'bridge0\x00'}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}]}, 0x30}}, 0x0) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r4, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x9c, r5, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x6}}, @NL80211_ATTR_SCAN_SSIDS={0x30, 0x2d, 0x0, 0x1, [{0x6, 0x0, [0x11, 0xa]}, {0x9, 0x0, [0x18, 0x1, 0x18, 0xe, 0x2]}, {0x9, 0x0, [0xc, 0x1, 0x14, 0xa, 0x14]}, {0x9, 0x0, [0x17, 0x12, 0x9, 0x8, 0xa]}]}, @NL80211_ATTR_SCAN_FREQUENCIES={0x44, 0x2c, 0x0, 0x1, [{0x8, 0x0, 0x401}, {0x8, 0x0, 0x8000}, {0x8, 0x0, 0x3ff}, {0x8, 0x0, 0xc6}, {0x8}, {0x8, 0x0, 0x8}, {0x8, 0x0, 0x200}, {0x8, 0x0, 0x3}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x20000000}, 0x80) r8 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r8, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r8, 0x0) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2000, 0x0) ioctl$VIDIOC_ENCODER_CMD(r9, 0xc028564d, &(0x7f00000002c0)={0x0, 0x0, [0x8, 0x996, 0xbe, 0x40, 0x401, 0x80000000, 0x2a8e, 0x8]}) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3, 0x0, 0xfc}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x20, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:30:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x41a0ae8d, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 644.419365][T24139] exFAT-fs (loop1): invalid boot record signature [ 644.425829][T24139] exFAT-fs (loop1): failed to recognize exfat type 19:30:15 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000300)={0x34, r1, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x20, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x5}]}]}]}, 0x34}}, 0x0) sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000480)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000300)={0x128, r1, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x40, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x74ae}]}]}, @TIPC_NLA_MEDIA={0x58, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x551f2c79}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x423}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9602}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_NODE={0x10, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffff24}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x40, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}]}, @TIPC_NLA_MEDIA={0x14, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NODE={0x18, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}]}]}, 0x128}, 0x1, 0x0, 0x0, 0xd800}, 0x80) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r3, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:30:15 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='se\\urity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0xb72, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) [ 644.666750][T24157] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 644.779491][T24164] exFAT-fs (loop1): invalid boot record signature [ 644.795545][T24164] exFAT-fs (loop1): failed to recognize exfat type 19:30:16 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0xb2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:16 executing program 0: iopl(0x7f) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:30:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0xc00, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:16 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='sec\arity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x8004ae98, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 645.174756][T24190] exFAT-fs (loop1): invalid boot record signature [ 645.341695][T24190] exFAT-fs (loop1): failed to recognize exfat type 19:30:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0xe00, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x80086301, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 645.631674][T24205] exFAT-fs (loop1): invalid boot record signature [ 645.642875][T24205] exFAT-fs (loop1): failed to recognize exfat type 19:30:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x1020, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) [ 645.873563][T24219] exFAT-fs (loop1): invalid boot record signature [ 645.892276][T24219] exFAT-fs (loop1): failed to recognize exfat type 19:30:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x1800, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x80086601, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 646.183676][T24231] exFAT-fs (loop1): invalid boot record signature [ 646.211800][T24231] exFAT-fs (loop1): failed to recognize exfat type 19:30:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x2000, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) [ 646.519660][T24245] exFAT-fs (loop1): invalid boot record signature [ 646.656600][T24245] exFAT-fs (loop1): failed to recognize exfat type 19:30:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x80087601, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:30:17 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x80c0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x2010, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) [ 647.099921][T24265] exFAT-fs (loop1): invalid boot record signature [ 647.106465][T24265] exFAT-fs (loop1): failed to recognize exfat type 19:30:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x2300, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) [ 647.347468][T24274] exFAT-fs (loop1): invalid boot record signature [ 647.361389][T24274] exFAT-fs (loop1): failed to recognize exfat type 19:30:18 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='sec\\rity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x80404507, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:30:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x2a6c, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:18 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000300)=""/69) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/cgroups\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f00000003c0)={0xff, @multicast2, 0x4e23, 0x3, 'lc\x00', 0x2a, 0x40, 0x3c}, 0x2c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$revoke(0x3, r2) request_key(&(0x7f0000000400)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x3}, &(0x7f0000000480)='lc\x00', r2) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x4a, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7e}, {0x0, 0x2, 0x1}, {0x3, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0xa}, {0x0, 0x0, 0x4, [], 0x81}, {0xff}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8, [], 0xff}, {0x3, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)='./file0\x00') r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0xffffffffffffffef, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x31b) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x8900, &(0x7f0000000200)={&(0x7f0000000740)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2b837}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x1, 'wireguard\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r5, &(0x7f0000000280), 0xfffffed3) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f00000037c0)={{{@in6=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}}}, &(0x7f00000038c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000003900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003940)=0x14) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000003fc0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000003f80)={&(0x7f0000003980)={0x5dc, 0x0, 0x200, 0x70bd27, 0x25dfdbfe, {}, [{{0x8}, {0x130, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0xffff}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x140, 0x2, 0x0, 0x1, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x6, 0x0, 0xf9, 0x8}, {0x4, 0x1, 0x9, 0x8000}, {0x1f, 0x4, 0xb2, 0x1ff}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x7fff}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x7fff}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x10000}}}]}}, {{0x8}, {0x1a0, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x8000}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r6}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r7}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0xff}}}]}}]}, 0x5dc}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000010) [ 647.658960][T24286] exFAT-fs (loop1): invalid boot record signature [ 647.685160][T24286] exFAT-fs (loop1): failed to recognize exfat type 19:30:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x2a6f, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:19 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)=[&(0x7f0000000740)='\x02\x00z3\x83\xa6\xcf\xb7I\xa1IUTK_\x88/\xb2\xa5\b\xeeI\xecV\xe5\xb9\f\xa8\x84h\xa5\xd3\x99\x0f\xe85$q\x93\xc2\t<\x93\x14,\xb9Yq\xfa\bV\xaf\xd8\x98\xa5\x00(\xbc\xb8\xa3G{r\xdd\xac\xdc\xa6\"\xd5!\xae\xd0\xc3\xb3z\xd2\xdaXQL\x80\xaccB\xe3^[\xb3&\xaad\xdf\x19\xf5E\xb1K\xd5\xb5d\xaa\xb2`[\xde\xcf\xea\x18\xeb\xf9M:\x1c6\x83\x89\x95\a\x8e\xfe\xb1\x85\x14\xe0\v\xca\xa2\x93\xcdjO\xda\xa4\xad\x12\tB\x13U\xb1_\xf8 \xf3|\xa4O\xc2\xb6\xc2N9#\xfaf)\x0f\xee\"\v\xc4\xc4\xd9:i\xaf<#-F\xc5J\xe3.\x8f\xd8\x00'/191, &(0x7f0000000080)='\a\x00t'], &(0x7f00000005c0)=[&(0x7f0000000340)='\xdf\x7f\x00\x00\x00w\x05\xce\x94\xce\xc4y\xf4\xfb\x88\xc8\xe8\x88\xd2\xffB\x0e\xe1#\x00\x00\xc7\xb2\x1b\xce\xf6\xbc', &(0x7f0000000600)='user\x00\xd1\xd8\xba\xa2C\xac\x17~\xd6\xbd\x89\x7f\xe2\xbb\xe9\xa5\xfcy\x7f\xa8\xf7\x1c\x9c\xb1\xd6-w*Eo\xbf=\x97\xcc\x01\xff\x9a\x94\xc2#\xabH\xfd\x9boZh\xa3t\xd5/\x91\x8a\x1f\xadt\x16\x14B\xdc~\xc3\xb7\x9eWe#\xfe}\xc8\xfb\x85vV\xe3;<\xca\xb4\xdf', &(0x7f00000000c0)=',cgroup\x00', &(0x7f0000000580)='\x04UM\x94\xb7\xd9\x02\xaf', &(0x7f0000000180)='}\x00', &(0x7f0000000340), &(0x7f0000000040)='}\x00', &(0x7f0000000440)='}\x00']) 19:30:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x8090ae81, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 648.083707][T24309] exFAT-fs (loop1): invalid boot record signature [ 648.136893][T24309] exFAT-fs (loop1): failed to recognize exfat type 19:30:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x2c04, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:19 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='secsrity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 648.443075][T24323] exFAT-fs (loop1): invalid boot record signature [ 648.476542][T24323] exFAT-fs (loop1): failed to recognize exfat type 19:30:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x3f00, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) [ 648.769027][T24337] exFAT-fs (loop1): invalid boot record signature 19:30:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x8138ae83, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 648.860077][T24337] exFAT-fs (loop1): failed to recognize exfat type 19:30:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) [ 649.101345][T24352] exFAT-fs (loop1): invalid boot record signature [ 649.131288][T24352] exFAT-fs (loop1): failed to recognize exfat type 19:30:20 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='secu\\ity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x4800, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x81a0ae8c, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 649.458916][T24369] exFAT-fs (loop1): invalid boot record signature [ 649.536898][T24369] exFAT-fs (loop1): failed to recognize exfat type 19:30:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x4c00, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) [ 649.894525][T24383] exFAT-fs (loop1): invalid boot record signature [ 649.937703][T24383] exFAT-fs (loop1): failed to recognize exfat type 19:30:21 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200), 0x56, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000003, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000040)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:21 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='secur%ty.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0xc0045878, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:30:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x6000, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) [ 650.522822][T24401] exFAT-fs (loop1): invalid boot record signature [ 650.529665][T24401] exFAT-fs (loop1): failed to recognize exfat type 19:30:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x6604, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0xc0045878, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 651.162148][T24417] exFAT-fs (loop1): invalid boot record signature [ 651.214925][T24417] exFAT-fs (loop1): failed to recognize exfat type 19:30:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x6704, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0xc0189436, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 652.075694][T24440] exFAT-fs (loop1): invalid boot record signature [ 652.211308][T24440] exFAT-fs (loop1): failed to recognize exfat type 19:30:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x6800, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:23 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000008, r2) dup(r0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 652.511638][T24451] exFAT-fs (loop1): invalid boot record signature [ 652.561419][T24451] exFAT-fs (loop1): failed to recognize exfat type 19:30:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x6804, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0xc018ae85, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 652.932677][T24465] exFAT-fs (loop1): invalid boot record signature [ 652.978780][T24465] exFAT-fs (loop1): failed to recognize exfat type 19:30:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x6904, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) [ 653.251105][T24479] exFAT-fs (loop1): invalid boot record signature [ 653.261207][T24479] exFAT-fs (loop1): failed to recognize exfat type 19:30:24 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='secur\\ty.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x6a04, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0xc020660b, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 653.651546][T24498] exFAT-fs (loop1): invalid boot record signature [ 653.701666][T24498] exFAT-fs (loop1): failed to recognize exfat type 19:30:24 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x6b04, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) [ 653.978972][T24513] exFAT-fs (loop1): invalid boot record signature [ 653.995369][T24513] exFAT-fs (loop1): failed to recognize exfat type 19:30:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4048ae9b, &(0x7f0000000080)={0x97ffffff}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:30:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x6c00, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) [ 654.320343][T24529] exFAT-fs (loop1): invalid boot record signature [ 654.354118][T24529] exFAT-fs (loop1): failed to recognize exfat type 19:30:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x6c04, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) [ 654.700918][T24542] exFAT-fs (loop1): invalid boot record signature [ 654.761698][T24542] exFAT-fs (loop1): failed to recognize exfat type 19:30:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4048ae9b, &(0x7f0000000080)={0x97ffffff, 0x2}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:30:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x6c2a, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) [ 655.039047][T24557] exFAT-fs (loop1): invalid boot record signature [ 655.158678][T24557] exFAT-fs (loop1): failed to recognize exfat type 19:30:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4048ae9b, &(0x7f0000000080)={0x97ffffff, 0x3}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:30:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x6d04, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:26 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='securi\\y.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 655.502070][T24577] exFAT-fs (loop1): invalid boot record signature [ 655.524892][T24577] exFAT-fs (loop1): failed to recognize exfat type 19:30:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x6e04, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4048ae9b, &(0x7f0000000080)={0x97ffffff, 0x4}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 655.867313][T24593] exFAT-fs (loop1): invalid boot record signature [ 655.897184][T24593] exFAT-fs (loop1): failed to recognize exfat type 19:30:29 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x4040c0, 0x109) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:29 executing program 5: semget(0x3, 0x5, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) r1 = syz_genetlink_get_family_id$netlbl_cipso(0x0) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f00000023c0)=ANY=[@ANYBLOB="b40300001eb9764eb445b89e034fa4b2a1d55bdf1e8efd42d46eac8e12419372b343914b7fbfdd2b4b5dcab5bdfdd85c940b4757739c811d374c929c64c29dab6339f05012b01568cdb039d240e70bf5a3bb6fbff62fad37adb611ab8b5e287eb025e4485a59216c904804eaba9270a8059adf6123a7842c28471c291e6ebb10113a8dffffffff64e1e8a37f94a88c3a806ce18dc3856da4d3a7fc19264415e06bc306e680655d6edcb86b8d211e7408", @ANYRES16=r1, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x4040000) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000040)={0x36c, r1, 0x10, 0x70bd26, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_TAGLST={0xc, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x78, 0xc, 0x0, 0x1, [{0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb954}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1645eba1}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2b890d77}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x74cb4be9}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x312b70f6}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x176aab6a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x76e5afac}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x243056ec}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4d6dc128}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x41f2}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd381}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa958}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x63ab9a48}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_MLSLVLLST={0xc8, 0x8, 0x0, 0x1, [{0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x52}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x549ac639}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x72409bba}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x382b9564}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x10bf6121}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7efb2b9e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xfe}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe9}]}, {0x54, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x192c49cd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x3a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x30974195}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf2}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x397c9027}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xa5273eb}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe0}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x70}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xef}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x98, 0x8, 0x0, 0x1, [{0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x72c15894}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4bc08a5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x41}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe7}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3a3dd621}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8c}]}, {0x4}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x22af2e2f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xaf}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x24252623}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5d6ead5a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x56817086}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x678232f5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x96}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xe5a012f}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x124, 0x8, 0x0, 0x1, [{0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x452e01e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x504fefc7}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x68f54b32}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7953e545}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc6}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x40638c9c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7de77bac}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4f6b4440}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x51d9b98f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x42}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3e161d32}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb4}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc7}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x22c8e856}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x390311c3}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcc}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x88}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7ba490c0}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x48}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3de7055a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xbc}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2e6232c4}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xe5b5b17}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4a7b17f0}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8b}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x30}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7e472e24}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4f8e2f3f}]}]}, @NLBL_CIPSOV4_A_TAGLST={0xc, 0x4, 0x0, 0x1, [{0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x6}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x2}]}]}, 0x36c}, 0x1, 0x0, 0x0, 0xf04d97bcf07caf6d}, 0x4004010) 19:30:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x6f04, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4048ae9b, &(0x7f0000000080)={0x97ffffff, 0x5}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 658.185534][T24620] exFAT-fs (loop1): invalid boot record signature [ 658.215265][T24620] exFAT-fs (loop1): failed to recognize exfat type 19:30:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x6f2a, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:29 executing program 5: semget(0x3, 0x5, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r2, &(0x7f0000000280), 0xfffffed3) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x101000, 0x0) ioctl$KVM_GET_PIT2(r3, 0x8070ae9f, &(0x7f0000000000)) r4 = semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT_ANY(r4, 0x8b502d37708aa057, 0x14, &(0x7f00000000c0)=""/55) semctl$IPC_RMID(r4, 0x0, 0x0) 19:30:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4048ae9b, &(0x7f0000000080)={0x97ffffff, 0x6}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 658.547180][T24638] exFAT-fs (loop1): invalid boot record signature [ 658.581824][T24638] exFAT-fs (loop1): failed to recognize exfat type 19:30:29 executing program 5: semget(0x3, 0x5, 0x20) 19:30:29 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='securisy.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x7004, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:29 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) mq_getsetattr(r0, &(0x7f0000000000)={0x5, 0xfff, 0x0, 0x400}, &(0x7f0000000040)) semget(0x2, 0x1, 0xbc) [ 658.981924][T24661] exFAT-fs (loop1): invalid boot record signature 19:30:30 executing program 5: semget(0x3, 0x5, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) setsockopt$inet_int(r0, 0x0, 0x1, &(0x7f0000000000)=0x10001, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttynull\x00', 0x81900, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000040)={0x2, 0x6, 0x4, 0x2, 0x2e, 0x0, 0x6d3f}, 0xc) [ 659.159967][T24661] exFAT-fs (loop1): failed to recognize exfat type 19:30:30 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x7000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xd) getpgrp(0x0) r0 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r0) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x28a000, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x700b, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4048ae9b, &(0x7f0000000080)={0x97ffffff, 0x7}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:30:30 executing program 5: semget(0x3, 0x2, 0x3ae) write$ppp(0xffffffffffffffff, &(0x7f0000000140)="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", 0x105) lsetxattr$security_evm(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000080)=@v1={0x2, "eedbed6d32816096e5604fe682727b8e2eb6d09f"}, 0x15, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000000)={0x3c, 0xa, 0xc, 0x13, 0x3, 0xa0, 0x6, 0x14f, 0xfffffffffffffffe}) read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) mmap$perf(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x12, r0, 0x5) [ 659.683910][T24685] exFAT-fs (loop1): invalid boot record signature 19:30:30 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x8, &(0x7f00000008c0)=0xc00) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54f, 0x0, @perf_config_ext={0x10000000005}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8140077c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 659.756412][T24685] exFAT-fs (loop1): failed to recognize exfat type 19:30:31 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x145801, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$revoke(0x3, r3) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r4, &(0x7f0000000280), 0xfffffed3) ioctl$DRM_IOCTL_MODE_OBJ_SETPROPERTY(r4, 0xc01864ba, &(0x7f0000000000)={0x2, 0xfffffffb, 0x3000, 0xbbbbbbbb}) keyctl$setperm(0x5, r3, 0x40020) semget(0x3, 0x5, 0x0) 19:30:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x7104, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4048ae9b, &(0x7f0000000080)={0x97ffffff, 0x8}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 660.178971][T24712] exFAT-fs (loop1): invalid boot record signature [ 660.234597][T24712] exFAT-fs (loop1): failed to recognize exfat type 19:30:34 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='securit\\.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:34 executing program 5: semget(0x0, 0x5, 0x106) 19:30:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x710b, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4048ae9b, &(0x7f0000000080)={0x97ffffff, 0xa}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:30:34 executing program 0: ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000001280)=""/191) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r2, &(0x7f0000000280), 0xfffffed3) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000000)={0x0, 0x0, 0x7ff}) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r4, &(0x7f0000000280), 0xfffffed3) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000002c0)={r3, 0x80000, r4}) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x1, 0x81}, {0x3}, {0x1, 0x3c, 0x4, [], 0xfd}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0xff, 0x48, 0x5b, [], 0x1}, {0x0, 0x0, 0x0, [], 0x3}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x4, 0x0, 0x4, [], 0x81}, {}, {0x0, 0x0, 0x2}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x7c, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:30:34 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x8000, 0x9, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 663.483445][T24744] exFAT-fs (loop1): invalid boot record signature 19:30:34 executing program 5: semget(0x3, 0x2, 0x48b) [ 663.542189][T24744] exFAT-fs (loop1): failed to recognize exfat type 19:30:34 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) ioctl$SOUND_PCM_READ_BITS(r1, 0x80045005, &(0x7f0000001580)) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x4000000000000016, &(0x7f00000004c0)) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(0xffffffffffffffff, 0x8983, &(0x7f00000016c0)) ptrace(0x4206, r2) ptrace(0x4203, r2) accept$netrom(0xffffffffffffffff, &(0x7f0000001700)={{}, [@default, @netrom, @netrom, @rose, @null, @default, @null, @bcast]}, &(0x7f0000001680)=0x48) r3 = syz_open_procfs(r2, &(0x7f00000015c0)='autogroup\x00') r4 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r4, &(0x7f0000000280), 0xfffffed3) ioctl$VIDIOC_DQBUF(r4, 0xc0585611, &(0x7f0000001280)={0x1, 0x0, 0x4, 0x40000, 0x1f, {0x0, 0x7530}, {0x4, 0x14, 0xb6, 0x6, 0x0, 0x1c, "3f37b8b2"}, 0x40000000, 0x1, @offset=0x7, 0x5, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_VERSION(r5, 0xc0406400, &(0x7f0000001540)={0x7c, 0x3, 0xb6, 0xaf, &(0x7f0000001300)=""/175, 0x7c, &(0x7f00000013c0)=""/124, 0xc7, &(0x7f0000001440)=""/199}) read$FUSE(r3, &(0x7f0000000280), 0xffffffffffffffef) getsockopt$IP_VS_SO_GET_TIMEOUT(r3, 0x0, 0x486, &(0x7f0000000000), &(0x7f00000002c0)=0xc) connect$inet6(r0, &(0x7f0000001600)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8, [], 0xfe}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:30:34 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='securite.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4048ae9b, &(0x7f0000000080)={0x97ffffff, 0xc}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:30:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x720b, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:35 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x14, r4, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r2, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x58, r4, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7f}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x86}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x20}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0xffff}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x40000}, 0x40000081) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) [ 664.186914][T24783] exFAT-fs (loop1): invalid boot record signature [ 664.193944][T24783] exFAT-fs (loop1): failed to recognize exfat type 19:30:35 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000740)=[{&(0x7f0000000080)="c63a92c939af8bbabcdf1bb1d9ffd30ad4c02281448a", 0x16}, {&(0x7f00000000c0)="751c98998e9f8d19c849102385d78d", 0xf}, {&(0x7f0000000340)="9daa3ee222c78d2e72372686a1465dc37ed6db1fb1d74b7c7fb33f5331c00943961312ca735c38eb5a93ffd618703b2a043d57cf7bb7c2ef35fa30a5f9e8a6520203aa7adaa09374822a4771fab858", 0x4f}, {&(0x7f0000000480)="48fff951a48be35eaf24cca5a760d2283d0308691458780a392a0c4c80ed197846ac9ca3805eca2e244205f860b6d935128a6ac8d695293fc37b1a3a656fe8635f9838ff14e26568eaff57efccdddd8e9dd4f2897b7ae1fc84c272d16c2d05ce725aab587d2029ed2ae968e653072a1ab2473b72010201315f9ea70e525bc854ea6dba7e642b6958d80887ce1748d9fae3eb3b741c015bc53e9f0b6d5711a72cc0874cd407e8f23e6ccb1513bf2f966a180b03a4a062a0ae7b253fb3a79ac2972d29733aed2e17ba0601c65de508e39f44e6a151daca97158a1b08e815469715ed287a9ea3841135", 0xe8}, {&(0x7f0000000640)="e86df26606e795735884b9e7953937c3e492cbe1c701a4fe89193c1fe93cf7019611b7d64f11e3f1dc3cbcb21c660243645f16f0913b56d6937e0af16eb244f08ad2d8fac44e36b51454624295d652a563a0572085315dfc05bab9c570a4a2bae6d1f73c5a68a760ac00d8059cc3bdf02f1b2ef56d14733d317c335c98b964e97768af3047926c2841200c8c5d594a8715230d4bb26423b7f22c8d38f79e647c6cf20637221f41d7c8de60b3bf8637d54b61551386ed1fdabe0a4d0f4fc06c564437c425a15834a11499ad95359d3eefeee8", 0xd2}, {&(0x7f0000000100)="65d2145f261895e96e8981", 0xb}, {&(0x7f0000000900)="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", 0x1000}, {&(0x7f0000001900)="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", 0x1000}, {&(0x7f0000000180)="2343b53d9ce09829292250092f4fa53c1af5ff1b542b9f735eeba4aecc267642439d544a48c6443c4ddbe353d188a7ea2bd5bb90ff2e8db32cd207183aa6", 0x3e}], 0x9, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000040)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)) 19:30:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x7400, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:35 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x2}, {0x0, 0x0, 0x0, [], 0x1}, {0x7, 0x0, 0x0, [], 0x1}]}}) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) getsockname$unix(r1, &(0x7f00000002c0), &(0x7f0000000000)=0x6e) 19:30:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4048ae9b, &(0x7f0000000080)={0x97ffffff, 0x48}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 664.589319][T24802] exFAT-fs (loop1): invalid boot record signature 19:30:35 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000000)={0x10000, 0x1f, 0x4, 0x7fffffff}) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) r2 = fcntl$dupfd(r0, 0x203, r1) ioctl$SCSI_IOCTL_DOORUNLOCK(r2, 0x5381) [ 664.648633][T24802] exFAT-fs (loop1): failed to recognize exfat type 19:30:35 executing program 5: semget(0x3, 0x5, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x4) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0xa, 0x4e24, 0x5, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xfffffffa}, 0x1c, &(0x7f0000002480)=[{&(0x7f0000001280)="81c246921d10828a89e049e23431968e32de62d09ad8f8c1bbb88bca2257c28bb0776d69a5db6383261b887dcb080d3fa05cfad50d4afd90409d8a0677ecfb9207dc0c8e6d593e606ae74ad869f7e60cca4550810d8b689214ca30687b3816441adc97006f530bba328e392828ef315eaebd33d38715610250df27d6301ba526d00df2414850c39e99a32429b8da8256b827cc6781944457a92666fdd92c7cd120", 0xa1}, {&(0x7f0000000200)="b7", 0x1}, {&(0x7f0000001340)="5a254448a52efce2db219aec1f607e541031a59089b14e5f2f1e497add324d883444ae0b84ac9bdc945194e67188ffdc86349546d6b845d6cde90268da9c07c9323dc90b792a1a105a0dd8cbc54fcd16a370aae46b47718b38be586773f66a39f8315d0f74be1f57eb12a396fa4b315e0542009cd9ecdac73a787421851c498728", 0x81}, {&(0x7f0000001400)="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", 0x1000}, {&(0x7f0000002400)="f76782db8f9d6f447f21ccac0eb29eba81ae6d90d680084374af4edf004e0d29e963a1afc1a8728f8c3894cf7623cca32e684c1c3d145a4eabe68dd0da96254f74003967eb40f5edb02ec7a55cf3c3f6fcac5a3759dfe363bd5a0e61fdba91d744d573cdfd660f9f7c351a78d4a027407d", 0x71}], 0x5, &(0x7f0000002500)=[@dstopts={{0x30, 0x29, 0x37, {0x73, 0x2, [], [@hao={0xc9, 0x10, @remote}]}}}, @hopopts_2292={{0x38, 0x29, 0x36, {0x2f, 0x3, [], [@jumbo={0xc2, 0x4, 0x7}, @ra={0x5, 0x2, 0x4}, @jumbo={0xc2, 0x4, 0xbcd}, @jumbo={0xc2, 0x4, 0xdaf}, @enc_lim={0x4, 0x1, 0x7}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x1}}, @hoplimit={{0x14, 0x29, 0x34, 0x8001}}, @hopopts={{0xf0, 0x29, 0x36, {0x6c, 0x1a, [], [@calipso={0x7, 0x48, {0x0, 0x10, 0x7, 0x9, [0x802, 0x3ff, 0x8, 0x5, 0x6, 0x5, 0x3, 0x2]}}, @generic={0x1, 0x8a, "95a134240ee9a8fc8d28f2345b41ff83dbb372cd36d0da64e8259bd08370c26c9a8f17301ed3f9b3df1defad180b92f71d1895645688dec321f1929d600948c33032ac00667a2d10cb4753989dfaa0d65a7733d176a44b1ffcf31d1a15ce61aba6392facbffd2d61b40dc19e76010ffdcbbc5655621d32f4f38b38bb2870b67101ce240922cd0778a582"}]}}}], 0x188}, 0x20000000) r3 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000040)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_LISTALL(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r3, 0x10, 0x70bd2a, 0x25dfdbfb}, 0x14}}, 0x0) sendmsg$NLBL_CALIPSO_C_LIST(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, r3, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4050041}, 0x20000001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r4, &(0x7f0000000280), 0xfffffed3) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000002740)={0x990000, 0x6, 0x4, r4, 0x0, &(0x7f0000002700)={0x9909d0, 0x3, [], @string=&(0x7f00000026c0)=0x2}}) r6 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f00000027c0)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_LISTALL(r5, &(0x7f0000002880)={&(0x7f0000002780)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000002840)={&(0x7f0000002800)={0x2c, r6, 0x432, 0x70bd27, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20044821}, 0x44) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x101080, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r7, 0x541c, &(0x7f0000000040)={0xd, 0x7}) 19:30:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x7a00, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) [ 664.839233][ T26] audit: type=1400 audit(1586633435.960:31): avc: denied { name_bind } for pid=24817 comm="syz-executor.5" src=20000 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 19:30:36 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r2, &(0x7f0000000280), 0xfffffed3) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x5, 0x9c9, 0x3}, &(0x7f00000002c0)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000300)={r3, 0x8, 0xf286}, 0x8) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) [ 664.913924][ T26] audit: type=1400 audit(1586633435.990:32): avc: denied { node_bind } for pid=24817 comm="syz-executor.5" src=20000 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 [ 664.988505][T24826] exFAT-fs (loop1): invalid boot record signature [ 664.995384][T24826] exFAT-fs (loop1): failed to recognize exfat type 19:30:36 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security/capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:36 executing program 5: semget(0x3, 0x5, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x20080, 0x0) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)={0x13c, 0x2, 0x1, 0x401, 0x0, 0x0, {0x1, 0x0, 0x7}, [@CTA_NAT_SRC={0xf4, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @loopback}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_PROTO={0x54, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e24}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e21}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e21}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e22}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e21}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e23}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}]}, @CTA_NAT_PROTO={0x44, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e23}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e24}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e23}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e22}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e21}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MINIP={0x14, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @CTA_NAT_V6_MINIP={0x14, 0x4, @ipv4={[], [], @multicast2}}]}, @CTA_SEQ_ADJ_ORIG={0x34, 0xf, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_AFTER={0x8}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0xfff}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x1ff}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x3}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x9}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0xfff}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x800}, 0x0) 19:30:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0xedc0, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:36 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000000)={0x1, 'ip6erspan0\x00', {}, 0x3}) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x4, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:30:36 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827ffff4cb6057fd86d3f7b3ee3aa13b2e6d3f91e4965ee41a783650eadbacf588c939226adb5afb2e71f433a6f6fa5179eb197e0048f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db9f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0xa6}, 0x0, 0x2, 0x0, 0x7, 0x3e}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4048ae9b, &(0x7f0000000080)={0x97ffffff, 0x4c}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 665.431066][T24850] exFAT-fs (loop1): invalid boot record signature [ 665.437783][T24850] exFAT-fs (loop1): failed to recognize exfat type 19:30:36 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7fff, 0x10100) ioctl$MON_IOCQ_URB_LEN(r0, 0x9201) 19:30:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0xff00, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:36 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x80800, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {0x0, 0x0, 0xf0}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {0x0, 0x0, 0xfe}, {}, {0x0, 0x0, 0x0, [], 0x80}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x4, 0x0, [], 0x3}, {0x0, 0x0, 0xff, [], 0x1}, {0x7}]}}) 19:30:36 executing program 5: semget(0x3, 0x5, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/full\x00', 0x24001, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000001940)={&(0x7f0000001800)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001900)={&(0x7f0000001840)={0x90, 0x1, 0x2, 0x301, 0x0, 0x0, {0x0, 0x0, 0x4}, [@CTA_EXPECT_TUPLE={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x20}}}}]}, @CTA_EXPECT_MASTER={0x48, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @empty}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}]}, @CTA_EXPECT_MASTER={0x1c, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x40000}, 0x4004835) open(&(0x7f0000000040)='./file0\x00', 0x1ad080, 0xcb) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r2, &(0x7f0000000280), 0xfffffed3) ioctl$IMGETCOUNT(r2, 0x80044943, &(0x7f0000000000)) [ 665.856127][T24874] exFAT-fs (loop1): invalid boot record signature [ 665.937050][T24874] exFAT-fs (loop1): failed to recognize exfat type 19:30:37 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security;capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4048ae9b, &(0x7f0000000080)={0x97ffffff, 0x68}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:30:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0xff0f, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:37 executing program 5: r0 = semget(0x2, 0x4, 0x63) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000001040)={0x0, 0x10001, 0x4, &(0x7f0000001000)=0x8001}) semctl$SEM_INFO(r0, 0x0, 0x13, &(0x7f0000000000)=""/4096) prctl$PR_GET_KEEPCAPS(0x7) [ 666.303913][T24901] exFAT-fs (loop1): invalid boot record signature [ 666.338279][T24901] exFAT-fs (loop1): failed to recognize exfat type 19:30:37 executing program 5: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x200000, 0x0) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c00000003ff0101000000000000000003000000050001000700000005000100070000000500010007000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000801}, 0x8010) semget(0x3, 0x2, 0xd3) 19:30:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x3b998, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) [ 666.677282][T24920] exFAT-fs (loop1): invalid boot record signature [ 666.683755][T24920] exFAT-fs (loop1): failed to recognize exfat type 19:30:37 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000900)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6b5ffffff8db3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e03d3a1d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0eb28bebfec5b9c9671b89cd07c4bdc8968b395dd0fe67175979702434969302dbbc73f7d62b869d76960243724c0cc99b944621cf4673a086ed0772bc52ebd26523807917084c614d7043b2ef42ab090370a3d9cf4513632b8823c75dce82f375b1d7c9572df013dd124e82a1bdb2ea498267dcaa196356d7ee8b0ebcabd08506f266d6168731275cd1802077c3d0051df83ba09a41e02d8d4ff4cf5e89f4c73b41a23a8b31e2bfcbe65f1632efc8d97801d10a5b2c8d85c545d36bbf138e517e3f9106ac99463cea15396db25509feac77715ba9409008e4d697a6adc5e45e3a7a77aa77edd6bba9a34c7fc6eeed94f993844ba2feb450343306ec131390bb5a7", 0x1e1}, {&(0x7f0000000340)="e59b989ddcb54ff686507bebfc0c6d10127e785be94aed953bab21da96bb9efc32935f3a19a17dae2cc0e23f29b8800035cc81371299ff49acce3a21e8f85b21b293c108823f6b11e1f717f37416aae52a84bc3782b7149ca51d104ffd3a7d010f1ca5574bdaa74bb7f4ea4ac52f19587ddf6dae6261791e22583540c56c368c2128b746fc4a115f44c2cf90fe0d0760e8d4b16c24ce64f6ce1c6191bbaea09e56852f78cc48c45f4ca254d4391ca79dfc5e09cdf03d9e998e31ed9fabf6ab32dc14696ff616351386f1ab6bc8a3c2d1c0b79b45c1621c107b4df37501823dd6f678b6af0b42bdd0256ff2a2fbc61997fb1da3", 0xf3}], 0x2, 0xc) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:37 executing program 0: connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(0xffffffffffffffff, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f00000002c0)={0x0, 0x0, @ioapic={0x0, 0x5, 0x2, 0x0, 0x0, [{0xff, 0x0, 0x83}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x18}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x3f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0xe, 0x0, [], 0x6}, {0x5, 0xfc}, {0x0, 0x1f, 0x0, [], 0x17}, {0x0, 0x0, 0x6, [], 0x81}, {0x80}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x141, 0x0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000500)=ANY=[@ANYRES32=0x0, @ANYBLOB="ffff0500090000005300060001016a73eea58646192d598ef95090cdb62440b27110934883f93e58a90434081b2840306c6d026230c0ae23f42e9c05d27f58ed71a593a0651cda6f5300b5bc168ccf020c31f81a6d59b1282e8d348be1b2573c758a3692c0f2e7d35f213fc574e436bbddfb8e1984f1"], 0x12) setpriority(0x0, 0x0, 0xffff) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)={{0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7f}, 0x101, 0x7, 0x10001, 0xffff, 0x0, r1, 0x7fff}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getpgrp(0x0) setpriority(0x0, r5, 0xffff) r6 = getpgrp(0x0) setpriority(0x0, r6, 0xffff) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)={{0x1, 0x0, 0x0, r3, r4, 0x4, 0x7f}, 0x101, 0x7, 0x10001, 0xffff, r5, r6, 0x7fff}) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB="48030000000000000800000000000000060000000000000002000000000000000700000000000000f7110000000000007e000000050000000400000000000000060000000000000083434b1000000000050000000000000003000000000000000300000000000000050000000002000007000000ffffff7f000000faafa59a85babb0af03bd4c5616c91c280", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="4000000078000000000000000400000000000000ff0f0000000000000a000000030000002f6465762f7663737500000000000000010000000000000002000000000000000300000000000000080000000000000001040000070000000500000000000000d43c00000000000081000000000000000002000000000000f7ffffffffffffff010400000000000006000000ff7f0000090000000100000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff0100000100000000000000060000000000000007000000000000000a000000050000002f6465762f7663737500000000000000030000000000000000000000000000000400000000000000080000000000000004000000b50b00000300000000000000070000000000000004000000000000000300000000000000010000800000000000010000000000000300000006000000037600000700000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="040000007d000000000000000100000000000000000000000000000001000000ffff0000340000000000000004000000000000000300000000000000ffff0000000000007653000000000000080000000700000005000000000000000500000000000000020000000000000000100000000000001f00000000000000ff7f000000000000ff07000006000000060000000100000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000ff03000000000000050000000000000009000000000000000400000063df00005b656d30000000000300000000000000020000000000000003000000000000000900000000000000000000000000000504000000000000000104000000000000a2000000000000000000f07b000000000100000001000000d4f3ffffffffffff00ffffff06000000010000000400000002000000", @ANYRES32=r2, @ANYRES32=r4, @ANYBLOB="030000000500000000000000050000000000000002000000000000000a000000250f00002f6465762f7663737500000000000000"], 0x348) 19:30:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4048ae9b, &(0x7f0000000080)={0x97ffffff, 0x6a}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:30:37 executing program 5: timer_create(0x0, &(0x7f0000000000)={0x0, 0x16, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_delete(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r2, &(0x7f0000000280), 0xfffffed3) bind$vsock_stream(r2, &(0x7f0000000080)={0x28, 0x0, 0x0, @host}, 0x10) fcntl$setsig(r1, 0xa, 0x26) semget(0x3, 0x5, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') r4 = getpid() rt_tgsigqueueinfo(r4, r4, 0x4000000000000016, &(0x7f00000004c0)) ptrace(0x4206, r4) ptrace(0x4203, r4) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo/3\x00') read$FUSE(r5, &(0x7f0000000280), 0xfffffed3) ioctl$PPPIOCGMRU(r5, 0x80047453, &(0x7f0000000040)) read$FUSE(r3, &(0x7f0000000280), 0xfffffed3) setsockopt$ax25_SO_BINDTODEVICE(r3, 0x101, 0x19, &(0x7f0000000000)=@rose={'rose', 0x0}, 0x10) 19:30:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x3b9dc, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:38 executing program 5: semget(0x1, 0x0, 0x61a) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000000016, &(0x7f00000004c0)={0x0, 0xffffffff}) ptrace(0x4206, r0) getpgrp(r0) ptrace(0x4203, r0) syz_open_procfs(r0, &(0x7f0000000040)='smaps\x00') openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dri/renderD128\x00', 0x101000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f0000000080)) [ 667.055108][T24941] exFAT-fs (loop1): invalid boot record signature [ 667.089405][T24941] exFAT-fs (loop1): failed to recognize exfat type 19:30:38 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security\\capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:38 executing program 5: semget(0x3, 0x5, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000140)={0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bpq0='bpq0\x00', 0x8, 'syz1\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2, 0x3, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast]}) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r3}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000000)={r3, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x8, 0x2}, &(0x7f00000000c0)=0x90) 19:30:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0xe0000, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4048ae9b, &(0x7f0000000080)={0x97ffffff, 0x6c}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:30:38 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f0000000000)) ioctl$CAPI_INSTALLED(r0, 0x80024322) semget(0x3, 0x5, 0x0) [ 667.646645][T24970] exFAT-fs (loop1): invalid boot record signature [ 667.664589][T24970] exFAT-fs (loop1): failed to recognize exfat type 19:30:38 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000000)={0x0, 0x100}, 0x8) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x3f, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x1, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:30:39 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, 0xffffffffffffffff) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:39 executing program 5: ioctl$VIDIOC_SUBDEV_G_CROP(0xffffffffffffffff, 0xc038563b, &(0x7f0000000000)={0x0, 0x0, {0x3, 0x1, 0x793, 0x9}}) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r0, 0x4010ae74, &(0x7f0000000040)={0x5, 0x173, 0xfff}) semget(0x3, 0x5, 0x0) 19:30:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:39 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000000)={0x0, 'team_slave_0\x00', {0x8000}, 0x101}) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r2, &(0x7f0000000280), 0xfffffed3) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000001280)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x6c, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x3}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x1e, 0x1f, 0x0, [], 0x9}, {0x0, 0x0, 0x4, [], 0x81}, {0x0, 0x0, 0x2}, {}, {0x9, 0x0, 0x20}, {0x22}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0xfc, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:30:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4048ae9b, &(0x7f0000000080)={0x97ffffff, 0x74}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:30:39 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.\\apability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:39 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="25bca274769e620a2734fa0095e0612687ecb86a548802a900700100000000004e2f98b579a782d270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="6ae31e91e93d76667376312c6461d45a81126b5b5fe6ea55db5bab4e9e52f1445c41fdb6ac5c562463852f15bdb2b5caf2efad955a8a4b962c28ca6d31a8ceef6fe3e42b2d0b4f2cfd5a06ad0feaed016a313b6b3b544b942e698e205b3c9ca9577be49c4450736ee000d4653d8fe0f87a4263bb8a"]) read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r1, 0x40045542, &(0x7f0000000080)=0x9) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8982, &(0x7f0000000000)={0x7, 'virt_wifi0\x00', {0x4}, 0x6}) [ 668.457365][T25008] exFAT-fs (loop1): invalid boot record signature [ 668.535607][T25008] exFAT-fs (loop1): failed to recognize exfat type 19:30:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4048ae9b, &(0x7f0000000080)={0x97ffffff, 0x7a}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:30:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) [ 668.716277][T25028] EXT4-fs (loop5): Unrecognized mount option "jã‘é=vfsv1" or missing value 19:30:39 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f0000000000)={0x7, 0x2, 0xe210, 0xfff, 0x6, 0xbc5}) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r1, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:30:40 executing program 5: semget(0x3, 0x5, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000001c0)={0x9c0000, 0x3, 0xfffffff9, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x980911, 0x1ff, [], @p_u32=&(0x7f0000000080)=0x6}}) dup(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r3, &(0x7f0000000280), 0xfffffed3) getsockopt$IP_VS_SO_GET_TIMEOUT(r3, 0x0, 0x486, &(0x7f0000000200), &(0x7f0000000240)=0xc) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @local, 0x4}, {0xa, 0x0, 0x0, @mcast1}, r4}}, 0x48) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000)=0x1, r4, 0x0, 0x0, 0x1}}, 0x20) [ 668.950630][T25046] exFAT-fs (loop1): invalid boot record signature [ 669.022283][T25046] exFAT-fs (loop1): failed to recognize exfat type 19:30:40 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0)='nl80211\x00') r2 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x30, r1, 0x11, 0x0, 0x0, {}, [@NL80211_ATTR_WIPHY_NAME={0x14, 0x2, 'bridge0\x00'}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x30}}, 0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x44101046}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, r1, 0x200, 0x70bd2d, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x40000) 19:30:40 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) r2 = fcntl$dupfd(r1, 0x80c, 0xffffffffffffffff) ioctl$VHOST_VSOCK_SET_RUNNING(r2, 0x4004af61, &(0x7f0000000000)=0x1) 19:30:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x3000000, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:40 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x2002) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000002c0), &(0x7f0000000300)=0x4) 19:30:40 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext, 0x48900, 0x0, 0x0, 0x7, 0x1, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4048ae9b, &(0x7f0000000080)={0x97ffffff, 0xda}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 669.753084][T25086] exFAT-fs (loop1): invalid boot record signature [ 669.761720][T25086] exFAT-fs (loop1): failed to recognize exfat type 19:30:41 executing program 5: semget(0x3, 0x5, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000000)=r2, 0x4) 19:30:41 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)={0x28, r2, 0x23f, 0x0, 0x0, {{}, {0x0, 0x410c}, {0xc, 0x14, 'syz0\x00'}}}, 0x28}, 0x1, 0xfffffff0}, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000001340)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001300)={&(0x7f00000012c0)={0x38, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, {}, {0x1c, 0x17, {0x17, 0x2, @l2={'ib', 0x3a, 'ip6erspan0\x00'}}}}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x4000014}, 0x40040) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r3, 0x0) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) ioctl$SNDCTL_DSP_GETISPACE(r0, 0x8010500d, &(0x7f0000001380)) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r5, &(0x7f0000000280), 0xfffffed3) ioctl$VIDIOC_G_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000340)={0x9d0000, 0x3, 0x1000, r5, 0x0, &(0x7f0000000300)={0x990afd, 0x1000, [], @p_u32=&(0x7f00000002c0)=0x4}}) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:30:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:41 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.c\\pability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:41 executing program 5: semget(0x3, 0x5, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000000016, &(0x7f00000004c0)) ptrace(0x4206, r0) ptrace(0x4203, r0) r1 = syz_open_procfs(r0, &(0x7f00000001c0)='uid_map\x00') sendmsg$NFNL_MSG_COMPAT_GET(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="30000000000b010400000000000000000200000108000240000000010c000100636d646c696e65000810024000000003"], 0x30}, 0x1, 0x0, 0x0, 0x4000040}, 0x40) read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) [ 670.087529][T25109] exFAT-fs (loop1): invalid boot record signature 19:30:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4048ae9b, &(0x7f0000000080)={0x97ffffff, 0x300}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 670.207512][T25109] exFAT-fs (loop1): failed to recognize exfat type 19:30:41 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @pic={0xc2, 0x7f, 0x6, 0x1f, 0x2, 0xe4, 0x2, 0x45, 0x7f, 0x6, 0xff, 0x7, 0x7, 0x80, 0x6, 0x6}}) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000000)=0x6, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f00000002c0)={{0x1, 0x0, @reserved="528135be4472e65843cb4a20eed17a2234c6599567b5b0df8603191dfaab3eac"}, 0x2b, [], "aefb119523150531cd5085e396d77f24372ec04461e60294a8943bcfbff2f24ef1a00b2987c02d971cd199"}) 19:30:41 executing program 5: semget(0x3, 0x5, 0xc0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) r1 = dup(r0) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, &(0x7f0000000000)) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000080)={0x1, 'veth1_macvtap\x00', 0x1}, 0x18) 19:30:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x5000000, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:41 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) sendmsg$IPCTNL_MSG_CT_DELETE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x4c, 0x2, 0x1, 0x5, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_LABELS={0x1c, 0x16, 0x1, 0x0, [0x7f, 0x9, 0x4, 0x40, 0x6, 0x200]}, @CTA_SEQ_ADJ_REPLY={0x1c, 0x10, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0xfffffffd}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x3f}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x52b3}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x24008000}, 0x20000000) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) [ 670.601737][T25137] exFAT-fs (loop1): invalid boot record signature [ 670.641661][T25137] exFAT-fs (loop1): failed to recognize exfat type 19:30:42 executing program 3: r0 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(r0, 0x4004ae86, &(0x7f0000000000)=0x1) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x45108, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:42 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000000)=[@mss, @mss, @window={0x3, 0x7}, @mss={0x2, 0x919f}, @timestamp, @window={0x3, 0xfff}], 0x2000019f) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r2, &(0x7f0000000640)="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"/611, 0xffffffffffffff67, 0x40007bd, 0x0, 0xffffffffffffff4f) recvfrom$inet(r2, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0x0, 0x0, 0xfffffffffffffd25) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000000)) socket$pppl2tp(0x18, 0x1, 0x1) 19:30:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x6000000, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:42 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7, 0x1a5480) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f00000002c0)=0xffffffff, 0x4) 19:30:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4048ae9b, &(0x7f0000000080)={0x97ffffff, 0x500}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:30:42 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.cap\\bility\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 671.231407][T25170] exFAT-fs (loop1): invalid boot record signature [ 671.284734][T25170] exFAT-fs (loop1): failed to recognize exfat type 19:30:42 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000001380)=""/85, &(0x7f0000001400)=0x55) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f0000001280)=""/183) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r3, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1b, 0x3, &(0x7f0000000200)=@framed={{0x18, 0x2}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r4}, 0x70) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0x10, &(0x7f0000001500)={&(0x7f0000001440)=""/150, 0x96, r4}}, 0x10) read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) r6 = getuid() fsetxattr$system_posix_acl(r5, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000001340)={{}, {0x1, 0x2}, [{0x2, 0x2, r6}], {0x4, 0x1}, [], {0x10, 0x1}, {0x20, 0x5}}, 0x2c, 0x3) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x101, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0xff, 0x0, 0x0, [], 0x5}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0x1}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:30:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x7000000, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:42 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x1, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0xfffffffffffffffe, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x6c) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4048ae9b, &(0x7f0000000080)={0x97ffffff, 0x600}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:30:42 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000000)={0x2, 0x5}) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) [ 671.599348][T25194] exFAT-fs (loop1): invalid boot record signature [ 671.621261][T25194] exFAT-fs (loop1): failed to recognize exfat type 19:30:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x8000000, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:42 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) ioctl$FICLONE(r0, 0x40049409, r0) [ 671.870059][T25215] exFAT-fs (loop1): invalid boot record signature [ 671.881450][T25215] exFAT-fs (loop1): failed to recognize exfat type 19:30:43 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000040)=@v2={0x3, 0x2, 0x9, 0x7, 0x1d, "2c6c0fb04e8cc739365bb81b4ab9eb384b59c9232b999237d5db2f5ea0"}, 0x26, 0x1) semget(0x3, 0x5, 0x0) 19:30:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x9000000, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:43 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) accept4(r0, 0x0, &(0x7f0000000000), 0x80000) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x6}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5, 0x0, 0xfc}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x1f}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x40, 0x0, [], 0x3}, {0x0, 0x0, 0x80, [], 0x1}, {0x7}]}}) [ 672.118845][T25234] exFAT-fs (loop1): invalid boot record signature [ 672.135506][T25234] exFAT-fs (loop1): failed to recognize exfat type 19:30:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4048ae9b, &(0x7f0000000080)={0x97ffffff, 0x700}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:30:43 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capa\\ility\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0xa000000, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:43 executing program 5: semget(0x3, 0x5, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x18000, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r3}, 0x10) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x101, 0xaa, 0x3, 0xa639, 0x4, "35ca0d4fb6c4598c"}) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000100)={r3, @in={{0x2, 0x4e24, @broadcast}}}, 0x84) 19:30:43 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x8, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 672.741522][T25263] exFAT-fs (loop1): invalid boot record signature [ 672.756744][T25263] exFAT-fs (loop1): failed to recognize exfat type 19:30:43 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000000)={{0xa, 0x4e23, 0x4, @loopback, 0x7}, {0xa, 0x4e22, 0x2e59c357, @mcast1, 0x101}, 0xff53, [0x88, 0x9, 0xffffffff, 0x70, 0x0, 0x3, 0xbd]}, 0x5c) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x6) semget(0x3, 0x5, 0x0) 19:30:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4048ae9b, &(0x7f0000000080)={0x97ffffff, 0xa00}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:30:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0xb000000, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:44 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000001bc0)='/dev/input/mouse#\x00', 0x9, 0x40) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r4}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000001c00)={r4, @in6={{0xa, 0x4e20, 0x3f, @ipv4={[], [], @rand_addr=0x2}, 0x3}}, 0x7244, 0x5}, &(0x7f0000001cc0)=0x90) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:30:44 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x84, 0x0, 0x7, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x42f020ab}, @NFACCT_FILTER={0x34, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x8000}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x8}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x1}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0xe1}]}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x100}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x84}, 0x1, 0x0, 0x0, 0x40}, 0x4004000) 19:30:44 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, &(0x7f0000000000)='#\x00', &(0x7f0000000040)="03f7ca68d039fff99c941477418f61fe8c6d9871190cfd8d6a08ce1fed68b4d064c7f7dfdd8ef3a4d7ab0c588d5e2a3ec7b52c98175e20f7583623eeedf0ac7fdb3da050b15727f348484749dccdcc7f77f69b05d6b94aedfd79db82c655318617a4b4a6cad4aee666f43578eba5687e", 0x70) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) ioctl$PPPIOCGDEBUG(r1, 0x80047441, &(0x7f00000000c0)) semget(0x3, 0x5, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r2, &(0x7f0000000280), 0xfffffed3) ioctl$TCGETA(r2, 0x5405, &(0x7f0000000140)) [ 673.155457][T25294] exFAT-fs (loop1): invalid boot record signature [ 673.163510][T25294] exFAT-fs (loop1): failed to recognize exfat type 19:30:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0xc000000, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:44 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capab%lity\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:44 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getpgrp(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r4, &(0x7f0000000280), 0xfffffed3) fcntl$addseals(r4, 0x409, 0x4) setpriority(0x0, r3, 0xffff) r5 = getpgrp(0x0) setpriority(0x0, r5, 0xffff) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)={{0x1, 0x0, 0x0, r1, r2, 0x4, 0x7f}, 0x101, 0x7, 0x10001, 0xffff, r3, r5, 0x7fff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="b0400000100005072cbd70000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000090001a8004001c002c000a8014000700ff020000000000000000000000000001140007000000000000000000000000000000000004001c003c000a800500080001000000050008000200000014000700ff0100000000000000000000000000011400070000000000000000000000ffffffffffff18000a8014000700fe80000000000000000000000000002e04001c00"], 0xb0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setgid(r2) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(0xffffffffffffffff, 0x5) 19:30:44 executing program 5: semget(0x3, 0x2, 0x0) 19:30:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4048ae9b, &(0x7f0000000080)={0x97ffffff, 0xc00}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 673.460407][T25313] exFAT-fs (loop1): invalid boot record signature [ 673.478004][T25313] exFAT-fs (loop1): failed to recognize exfat type 19:30:44 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x10000000, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:44 executing program 5: semget(0x3, 0x5, 0x408) r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x1, 0x8400) getsockopt$ax25_int(r0, 0x101, 0x9, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 673.734557][T25335] exFAT-fs (loop1): invalid boot record signature [ 673.741642][T25335] exFAT-fs (loop1): failed to recognize exfat type 19:30:44 executing program 5: semget(0x2, 0x2, 0x220) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0xb63, 0x200082) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000080)=0xffffffffffffffff, 0x4) read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f0000000000)={0x9, 0x0, 0xfffffffd, 0x80000001, 0xe23, 0x3}) 19:30:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x18000000, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) [ 673.923719][T25348] exFAT-fs (loop1): invalid boot record signature [ 673.935073][T25348] exFAT-fs (loop1): failed to recognize exfat type 19:30:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x20000000, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:45 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) execveat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=[&(0x7f0000000040)='{-\x00', &(0x7f0000000080)='(/\x00'], &(0x7f00000001c0)=[&(0x7f0000000100)='.eth1+em0\x00', &(0x7f0000000140)='system--\x00', &(0x7f0000000180)='\x00'], 0x400) 19:30:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4048ae9b, &(0x7f0000000080)={0x97ffffff, 0x1f00}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 674.199288][T25364] exFAT-fs (loop1): invalid boot record signature [ 674.218135][T25364] exFAT-fs (loop1): failed to recognize exfat type 19:30:45 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capab\\lity\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:45 executing program 5: semget(0x3, 0x5, 0x200) 19:30:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x20100000, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4048ae9b, &(0x7f0000000080)={0x97ffffff, 0x2000}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:30:45 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(r0, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000900)="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", 0x16a}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400000, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x0, 0x8, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x8) getpgrp(0x0) setpriority(0x2, 0x0, 0xf9) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:45 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000500)) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x22a000, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, &(0x7f00000003c0)=""/219, &(0x7f00000004c0)=0xdb) write$P9_RREAD(r2, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xc9) 19:30:46 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) dup3(r0, r1, 0x0) semget(0x3, 0x5, 0x20) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x800, 0x0) [ 674.940674][T25396] exFAT-fs (loop1): invalid boot record signature [ 674.997761][T25396] exFAT-fs (loop1): failed to recognize exfat type 19:30:46 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r2, &(0x7f0000000280), 0xfffffed3) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000001280)) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000340)) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000300)='./file0\x00', 0x8, 0x1) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:30:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x23000000, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) [ 675.179030][T25417] [ 675.181384][T25417] ===================================== [ 675.186904][T25417] WARNING: bad unlock balance detected! [ 675.192434][T25417] 5.6.0-syzkaller #0 Not tainted [ 675.197349][T25417] ------------------------------------- [ 675.202876][T25417] syz-executor.0/25417 is trying to release lock (sk_lock-AF_INET6) at: [ 675.211255][T25417] [] mptcp_listen+0x1c3/0x2e0 [ 675.217475][T25417] but there are no more locks to release! [ 675.223188][T25417] [ 675.223188][T25417] other info that might help us debug this: [ 675.231234][T25417] 1 lock held by syz-executor.0/25417: [ 675.236664][T25417] #0: ffff888048fcf260 (slock-AF_INET6){+.-.}-{2:2}, at: release_sock+0x1b/0x1b0 [ 675.246482][T25417] [ 675.246482][T25417] stack backtrace: [ 675.252357][T25417] CPU: 0 PID: 25417 Comm: syz-executor.0 Not tainted 5.6.0-syzkaller #0 [ 675.260662][T25417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 675.270718][T25417] Call Trace: [ 675.274011][T25417] dump_stack+0x188/0x20d [ 675.278337][T25417] ? mptcp_listen+0x1c3/0x2e0 [ 675.282999][T25417] lock_release+0x586/0x800 [ 675.287485][T25417] ? lock_downgrade+0x840/0x840 [ 675.292370][T25417] ? do_raw_spin_lock+0x129/0x2e0 [ 675.297377][T25417] ? rwlock_bug.part.0+0x90/0x90 [ 675.302335][T25417] ? mptcp_shutdown+0x550/0x550 [ 675.307165][T25417] ? mptcp_release_cb+0x8a/0x290 [ 675.312203][T25417] release_sock+0x177/0x1b0 [ 675.316710][T25417] mptcp_listen+0x1c3/0x2e0 [ 675.321213][T25417] ? __mptcp_socket_create+0x450/0x450 [ 675.326726][T25417] __sys_listen+0x17d/0x250 [ 675.331212][T25417] ? __ia32_sys_bind+0xb0/0xb0 [ 675.335953][T25417] ? __x64_sys_clock_gettime+0x165/0x240 [ 675.341654][T25417] ? trace_hardirqs_off_caller+0x55/0x230 [ 675.347372][T25417] __x64_sys_listen+0x50/0x70 [ 675.352039][T25417] do_syscall_64+0xf6/0x7d0 [ 675.356530][T25417] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 675.362465][T25417] RIP: 0033:0x45c889 [ 675.366350][T25417] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 675.386393][T25417] RSP: 002b:00007fcb5e5dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000032 [ 675.394798][T25417] RAX: ffffffffffffffda RBX: 00007fcb5e5db6d4 RCX: 000000000045c889 [ 675.402762][T25417] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 675.410723][T25417] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 675.418682][T25417] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff 19:30:46 executing program 5: semget(0x2, 0x4, 0xa0) [ 675.426639][T25417] R13: 0000000000000712 R14: 00000000004c9e2d R15: 000000000076bf0c 19:30:46 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f901040000000000000eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4048ae9b, &(0x7f0000000080)={0x97ffffff, 0x3f00}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 675.492338][T25421] exFAT-fs (loop1): invalid boot record signature [ 675.505978][T25421] exFAT-fs (loop1): failed to recognize exfat type 19:30:46 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capabi%ity\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:46 executing program 5: semget(0x2, 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') r1 = semget$private(0x0, 0x0, 0x0) r2 = semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT_ANY(r2, 0x8b502d37708aa057, 0x14, &(0x7f00000000c0)=""/55) semctl$SEM_STAT_ANY(r2, 0x3, 0x14, &(0x7f0000001280)=""/78) semctl$GETNCNT(r1, 0x3, 0xe, &(0x7f0000000140)=""/170) read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000000)=""/254}) chmod(&(0x7f0000000200)='./file0\x00', 0x197) 19:30:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x2c040000, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) [ 675.731281][T25448] exFAT-fs (loop1): invalid boot record signature [ 675.738486][T25448] exFAT-fs (loop1): failed to recognize exfat type 19:30:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:47 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x38fb, @rand_addr="e4c0d6a6fd154aeeb9550042dab836b7", 0x7fffffff}, 0x1c) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:30:47 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capabi\\ity\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 675.949232][T25463] exFAT-fs (loop1): invalid boot record signature [ 676.010231][T25463] exFAT-fs (loop1): failed to recognize exfat type 19:30:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4048ae9b, &(0x7f0000000080)={0x97ffffff, 0x4000}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:30:47 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000000)={0x5e, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0x2, 'sh\x00', 0x28, 0x1, 0x4e}, 0x2c) 19:30:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x40000000, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:47 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:47 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r1, 0x8983, &(0x7f0000000000)={0x7, 'veth1_vlan\x00', {0x4}, 0x2}) [ 676.234453][T25488] exFAT-fs (loop1): invalid boot record signature [ 676.251896][T25488] exFAT-fs (loop1): failed to recognize exfat type 19:30:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x48000000, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:47 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8983, &(0x7f0000000000)={0x8, 'macvlan1\x00', {'veth0\x00'}, 0x3}) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) [ 676.451797][T25503] exFAT-fs (loop1): invalid boot record signature [ 676.460802][T25503] exFAT-fs (loop1): failed to recognize exfat type 19:30:47 executing program 5: r0 = semget(0x3, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) ioctl$VIDIOC_LOG_STATUS(r1, 0x5646, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r2, 0x0) msgrcv(r2, &(0x7f0000000080)=ANY=[@ANYPTR=&(0x7f0000002300)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRESDEC=0x0], @ANYPTR64=&(0x7f0000000040)=ANY=[@ANYRES32, @ANYRESHEX, @ANYRESOCT], @ANYRES64=r2, @ANYRESHEX, @ANYRESHEX, @ANYRESHEX, @ANYRESDEC=r0, @ANYRES64=r2, @ANYBLOB="5acc301bb49e3d18306e44b67645305f5024893a4a90e84c70605cd4c578829162706baf4204c80ae31546685593f70a803c795da898715d97f5e146d4cfcbf26e5ccea10e7f19b07e6b9c4844a8268f71417c2062031a6124d3cb779d45ce5006781b3617268dfab04dec1068ac95fd4ad05813b334732bcdb0bb39250ec39c8dc8babb240576d8dd2406d879900f79483c905e49bdb60ef1ab48ac1fcc282941c0de32f95bd78d28a13e47e4cb29acacb0f978360a8366d8a5ecc0e028", @ANYRESOCT], @ANYRESHEX=0x0, @ANYRES64=r2], 0x3, 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') socketpair(0x22, 0x1, 0x6, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x3, 0x80000, 0x4) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r5, 0x8982, &(0x7f00000001c0)={0x0, 'veth0_to_bond\x00', {0x2}, 0x8}) prctl$PR_GET_CHILD_SUBREAPER(0x25) setsockopt$inet6_udp_encap(r4, 0x11, 0x64, &(0x7f0000000180)=0x5, 0x4) read$FUSE(r3, &(0x7f0000000280), 0xfffffed3) ioctl$LOOP_SET_FD(r3, 0x4c00, 0xffffffffffffffff) getgroups(0x2, &(0x7f0000000200)=[0x0, 0xee00]) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r7, &(0x7f0000001300), 0x1000) r8 = fcntl$getown(r7, 0x9) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000001280)={{0x3, 0x0, 0x0, 0x0, r6, 0x0, 0x5}, 0x0, 0x0, 0x7, 0x800, 0x8, 0x10000, 0xf4e2, 0x0, 0x3ff, 0x964a, r8}) 19:30:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4048ae9b, &(0x7f0000000080)={0x97ffffff, 0x4800}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:30:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x4c000000, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:47 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x12}, 0x0, 0x0, 0x2, 0x8, 0x1, 0x5}, &(0x7f0000000040)=0x20) semget(0x3, 0x5, 0x0) [ 676.684325][T25525] exFAT-fs (loop1): invalid boot record signature [ 676.705648][T25525] exFAT-fs (loop1): failed to recognize exfat type 19:30:48 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capabil%ty\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:48 executing program 5: semget(0x3, 0x4, 0x0) 19:30:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x55aaffff, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:48 executing program 0: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000001280)='/dev/dlm-control\x00', 0x14000, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffffef, &(0x7f0000000180)={0x0}}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r3, &(0x7f0000000280), 0xfffffed3) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r4, &(0x7f0000000280), 0xfffffed3) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r1, &(0x7f0000000680)={0x0, 0x8900, &(0x7f0000000200)={&(0x7f0000001340)=ANY=[@ANYBLOB="4000000010001fff000000000000000000000000287c96c34708174412770cce3eb6142645c05af22afb6ff1ecf914f584a4d3a0", @ANYRES32=0x0, @ANYBLOB="37b8020000000000180012800e0001007769726567756172640000000400028008000a00", @ANYRES32=r5, @ANYBLOB], 0x40}}, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000012c0)={@local, 0x39, r5}) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(0xffffffffffffffff, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000013c0)='net/nfsfs\x00') read$FUSE(r6, &(0x7f0000000280), 0xfffffed3) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000001300)={0x0, 0x1, 0x800, 0x3ff, 0x0, "b103eed34dd5bdfec5cfebdb1a259453c4e82e"}) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0xffff, 0x100, 0x0, [{0xff, 0x0, 0x81}, {0x7f}, {0x81, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x1, 0x48, 0xdd, [], 0x1}, {0x0, 0x0, 0x20, [], 0x7f}, {0x7, 0x2, 0x1}, {0x5, 0x0, 0x1, [], 0x3}, {0x0, 0x0, 0x0, [], 0x6}, {0x5, 0x40}, {0x0, 0x1f, 0x9, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {0x4}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x3, [], 0x1d}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7, 0x0, 0xfe}]}}) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r7, &(0x7f0000000280), 0xfffffed3) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r7, 0x8982, &(0x7f0000000000)={0x3, 'macvlan0\x00', {}, 0x2}) [ 677.149339][T25542] exFAT-fs (loop1): invalid boot record signature [ 677.162396][T25542] exFAT-fs (loop1): failed to recognize exfat type [ 677.165115][T25544] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. [ 677.287949][T25544] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. 19:30:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x60000000, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4048ae9b, &(0x7f0000000080)={0x97ffffff, 0x4c00}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:30:50 executing program 5: semget(0x3, 0x2, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x1, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000040)) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x20141, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r2, &(0x7f0000000280), 0xfffffed3) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000180)={0x5}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r3, &(0x7f0000000280), 0xfffffed3) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, &(0x7f0000000080)=""/13, &(0x7f00000000c0)=0xd) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r4, &(0x7f0000000280), 0xfffffed3) getsockopt$CAN_RAW_FILTER(r4, 0x65, 0x1, &(0x7f0000000200)=[{}, {}, {}], &(0x7f0000000240)=0x18) statfs(&(0x7f0000001280)='./file0\x00', &(0x7f00000012c0)=""/194) keyctl$revoke(0x3, r1) keyctl$setperm(0x5, r1, 0x10000000) 19:30:50 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x2, 0x81) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000002c0)) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0xfe, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x1, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:30:50 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capabil\\ty\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:50 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x1, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x2002, 0x0) vmsplice(r0, &(0x7f0000000cc0)=[{&(0x7f0000000d80)="51e94f666f95fae0b7479aceacdbcee26b372ca0a5c21345c6179aba10c7e1a1f85ed4ca854f579e456735252c184fcd8a3cacd6de558af9f24bb13a88aa6ec5444ccb4cb501ae7175695ea37bab47249066b7bbc24fa9fc55efe067cd1c1137af7c2e44f8fb84bf2eeac25bc222ab2c6c6841c8becf010674b8ebdb685462250a619d28932e3dc0e1bdd9019092e7e9de1f7101144b323b4ed6e5f690369e4a3b563178e5c656acf1c6a37b53096ea77f3cafd1175b12e4345e2d910f440bee0601f5af2f1e36eaee212fb6ff0bfed231e3eb00d15fe5ca64b589e96adc88cf1982", 0xfffffffffffffe4c}, {&(0x7f00000003c0)="08c43763a5199af2de7fceb03a84f6da3daadb9c6e2e69b2e5d1f14419a13a8061b8ddbd174fca0083e48c3d37626eaface02d2aad086ed555820558bee481d43f118c1190456e4395d59247f17e34523cde3f0f1dcc1d47f56a96919dc380763ecaba0e0009815a0184c04e93c7bcf3b17bab6e4fa672c7b4c29385", 0x7c}, {&(0x7f0000000480)="179bd702bfdfadb64c751b704d500923206691d99f9ba7fa6680d0bb8a10a7e2fec2bdb21cf461521e9c3caf1978a97d978681cfabc3392bfa9267ef70712cc9ee73c42d7c4b490daa5f005c524c78ffa2fe823a0266b99c821752e97df7217fdb3170272cc081c32655b37911d7e3968599d13813886a781010d5dbc9178437a481e9af414c65924eb3a1a7ab08538981a71eb8b7289e6bc16262fd2b123657656a54351f354c3112e960ebdb8290e9fb64d1fb0ae549d8ccb614e2126e61a0fcddfbcee1b3de521cb3bdb228be855a1e169a3b1f14c23a43020782ae79eae667ed34c93331e48e459f0face6", 0xed}, {&(0x7f0000000900)="1b154d1c64ef799f0a4be4d6aa9df93752ee9132f2091e524e95962dcbb1daf1b02ae09d195999be7d2d1714cf221b8e727805d640d5c0d312b64d5af737e6863888bbaffdce2eeafc8d6281fce4c45f7f46f8f6390a66b5d742b6f856282dee1897701a1c5db31729bb96afd8809070fa27beb025c4c27cbf2e43be51bfbfdf4edd38e4e0179be917897bbddbae0076c4c35ab2f5ed8afa0af8fab3fa3b199883d7bc37852642f6c8ecfedcfedd80394fd7540f7f5ba4f274300ae13adae34eb3774e88944cc65b751ed767edd132bf08324fc01d399c49e4ca", 0xda}, {&(0x7f0000000a00)="fd6f32ffe1a75f836b9c492fa582d63468c20262e34efee038aeb418c2d016bd3270c52312c8d138629a9673169153c688daaa3bd4f30b34b4b97a22eed7210e0d0ca9d09befecaf33ae31c1b7f22e5fc8dd5353c05e064e576dcb50b715f40df307c97d4cdff7bab75dc40342c9b0075088eb814db014c3a1b810faf26646df7c2d6999d53b32a115448aef9a2ff9ca14008c452be400e1a3b1d78b005d4cccbf28fc8fe9cecff9a2bda20c8f54d94269ba8654399535852c98fd4593000000000000000000", 0xc6}, {&(0x7f0000000340)="19848d72e86b25a604070c40043883ce34ec56c849502876dc0438ea12577639f72709c71987d95b5abfabf0da3d4f5780239f7a49bf35aa0d0055b7b422d9338e5bc7f3969c365bb52836ab6e0231e5f27571447b9a0d5080afb9063285600a", 0x2f}, {&(0x7f0000000b00)="b12997e93ed067b759da6a634887b2ac5ab9a6515d4a3513b4e990e9ace9fdebfcd04c2edf88f143a9809c06267fa370177bc0fc28f48ad52f7747e8068494ad7fd4026dd65672d60f0dcffdf17e8d863037d1e99070ad0886df01fd6fbf4e94a76582c4ad710952c5cbfcd606f1990be0b8d66ed7f034be5b001aeb46d89b38a7d929337f2195d3731220a7b82aa65ad3d058f84e0efbf3a6a22de56f6432cac300c6a0ed0c93c56f6a8db4899388912da35afa061b70152add6241330ca0d1df4aeae005b57fda465dbc8d23072c6647e8d53579fae4abdef53ccc0fdce4f0c6436a3e9352151c9f7c622196", 0xed}, {&(0x7f0000000040)="a7ec7721d1b9e7d74af682371b38b5b7554d866a47993ba89cb8087f92e5fe27762ce672983f472b7bb38c6050d382bca5546da08c76e3b8eb70201510efe0c6d7faad4a0b60c2411bfe901b61ca7218a0215dfad70b423d4d7e00db3441d20183360a20fbb908dbabc492b463389e8d18fd2e73a1da29d863474307dddf805b01d37776", 0x5d}, {&(0x7f0000000200)="cb773bef3e0802000000", 0xa}, {&(0x7f0000000e80)="8dc77150047c98e79bcbffa3adea2e3f84690c087d392a3bb72c6f736c3613c9dd0eb5a6b2ceb1cf94a148b657d124d1524de16e0f4e382d2262e5ea6433ea21b8425c40647c644f8e9f8661ea70f27542c2411d9f730079090560fd64e5a953f43472a188b0fd6588620ec39bcec2c9b82b799299cabf53fbc2e15daa7252d4342668306141bdecdd07b1349f0849217a595a3f4e0325a4ab0e057ecc1555e4e434220f11757724be4c6bd848d46cc63f9088eb350e5fc660731098f87394cb45ee630e0d410b945c419a0821e0367a97aff5d0e20cc558e0a81448708cb9ffeca1e1cf5f9dfdf9d789382fa46f", 0x36}, {&(0x7f00000005c0)="545c72a4c949abf266055bb7e026c35e0de0e759da9b5fefb35021bbc486", 0x1e}], 0xb, 0x6) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7e, 0x44008, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0xad, 0x10000}, 0x50414, 0xfffffffffffffffc, 0x0, 0x1, 0x1, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) setpriority(0x2, r1, 0xfffc) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) open(&(0x7f0000000140)='./file1\x00', 0xd7141c1f826ce027, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 679.026658][T25582] exFAT-fs (loop1): invalid boot record signature [ 679.094721][T25582] exFAT-fs (loop1): failed to recognize exfat type 19:30:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x66040000, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:50 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {0x0, 0x0, 0x1f}, {0x0, 0x0, 0x4}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:30:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4048ae9b, &(0x7f0000000080)={0x97ffffff, 0x6800}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 679.344690][T25608] exFAT-fs (loop1): invalid boot record signature [ 679.361837][T25608] exFAT-fs (loop1): failed to recognize exfat type 19:30:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x67040000, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:50 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @mcast2}, 0x1c) syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) listen(r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) signalfd(r1, &(0x7f0000000000)={[0x800]}, 0x8) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:30:50 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)={0x3c, r2, 0x1, 0x0, 0x0, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)) sendmsg$DEVLINK_CMD_GET(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000001700)=ANY=[@ANYBLOB="09000000a8bf50a73c04888372a3b2e845de62a5f5ae", @ANYRES16=r2, @ANYBLOB="000328bd7000ffdbdf2501000000080001007063690011000200303030303a30303a31302e30000000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080001007063690011000200303030303a30303a31302e30000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000e0001006e657464657673696d0000000f0002006e657464657673696d300000"], 0xac}, 0x1, 0x0, 0x0, 0x404c8c0}, 0x20000001) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$revoke(0x3, r3) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000016c0)={&(0x7f0000001380)="c6a1296810a5a9149579f1aa864a8ed257d2663829ba2640bcfce8579aede07091e2281f07c75a937e1826912d30714da7dfda35a238c1a1ff878bc86bb1fe88bf35581f9653e54f266780f62eb4c1087673c22aed030703fab27a8100e13e5eb8b975f51591ed62c335de6ff33949fbabb8619de6ccb52cfcfddd042691f7", &(0x7f0000001400)=""/254, &(0x7f0000001500)="6ba487d871813d0b8283904fffe9d4c467509ed5591de960f4420d06c6631ef6d6d5bacb0fbaa81d2c76d2181bd9f4e967af59853d0e48edadf442b10f716fd9dd1f8e563dded05fbfcab6b99edae32404718c39d493368df234e5ee3fea0e1d6dcdd000cd5ee00a859d3b991b6c67eb3dbf428147d4956331bc2761ae56ac96249e1938b810cb3613beb6809c83bf98ba4f75da81da44cc06f85079747b380b1cad05b1315fa2e69835ae4d34fbeb19dc8974ab26312f1dce697afe96453fe920846c29fe4a8f292e6122b2eef8e3ce1734d7111f44a5023a03fae0c46b", &(0x7f0000001600)="a4900ca8eaabfdd943eb82822172d7d510feaab8d4b11d7263a25e6c656a902621095142edc623b2a07401fea99e652242a4c20f9c3119114988d095ea8952281f96012ffb222f1227fd47efb103173de8851411066ed05c0786388e94819efd310e7f955abd2425c05ab8a079f3d006f52f085dad65f7afb616fa3d4f59e08860ac9f614e2eeba7a4107277f2f05abbbe15eeb3878b815933f20276c1c726173ae834463bc584f5b27cb9b51f060fbb056fa55b62ecf85f0a8badb526202930", 0x8, r0}, 0x38) keyctl$read(0xb, r3, &(0x7f0000000100), 0x0) r4 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x500, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r4, 0x29, 0x41, &(0x7f0000000180)=ANY=[@ANYBLOB="66696c74657200000000000000000800000000000000000000000000000002000300000000000000000000000000000000000000000000000000000000000000000000000000ed000000000000000000000000000000000043d75c6ee1c1c6ec8abac806c06957279f51ba1516753243dedb775fcb6f7d1a07e9b207181dd7853ffbc39f76d68af210f0a96cffd8df655827c69c4515f83e8f"], 0x58) ioctl$TCSETA(r4, 0x5406, &(0x7f00000000c0)={0x9, 0x7fff, 0x0, 0x2, 0xa, "f5ffffff00000800"}) r5 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x101040, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) semget(0x3, 0x3, 0x0) 19:30:50 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) pkey_alloc(0x0, 0x2) dup(0xffffffffffffffff) bind$isdn(0xffffffffffffffff, &(0x7f0000000040)={0x22, 0x5, 0x4, 0x6, 0x8}, 0x6) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SOUND_MIXER_READ_RECMASK(0xffffffffffffffff, 0x80044dfd, &(0x7f0000000080)) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000180), &(0x7f0000000100)=[&(0x7f0000000340)='\xd7\x06\xac>(\xd5\xf3\xea\x95\x9e\xf8\x1a|\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xe34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98eQ\xf9\x1d\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9\r\x15\xee\x0fXM\xc9U\x85*=\xd7\x90n4\xa7\v\x8e\x89\x9d\x04\x856\xa3A\b\xf8\xfd\x94+\x80\x17\xff', &(0x7f0000000740)]) [ 679.515562][T25628] exFAT-fs (loop1): invalid boot record signature [ 679.525507][T25628] exFAT-fs (loop1): failed to recognize exfat type 19:30:50 executing program 5: semget(0x3, 0x5, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) sendto$unix(r0, &(0x7f0000000000)="831f642c4284b5be164a83647aed79fb37220574ca503f397f4643109856efecf79ac067ccdbb434dbdfe438d64e685719bae57c5ec5959e0e09567922ce93d8664ad51e36573c305995a281752fbdeba22f2caf9948e2159bfdc3ed9f05491a82cb9115bfe293f70543340340a3af2f1b86fe396362f54b54240d22679b12250a5c0a1f91a0b75e17f8420b7a822ddf1c31b5d478f9ac9499e26bfa6dea725205a88ebed3e29b2f91bef482e930", 0xae, 0x0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 19:30:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x68000000, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:50 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000002c0)={0x3, &(0x7f0000000000)=[{0x0}, {}, {}]}) ioctl$DRM_IOCTL_SWITCH_CTX(r1, 0x40086424, &(0x7f0000000300)={r2}) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) [ 679.663040][T25648] exFAT-fs (loop1): invalid boot record signature [ 679.676093][T25648] exFAT-fs (loop1): failed to recognize exfat type 19:30:50 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capabili\\y\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x68040000, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:50 executing program 5: semget(0x2, 0x5, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') umount2(&(0x7f0000001280)='./file0\x00', 0x8) read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(r0, 0xc2604111, &(0x7f0000000000)={0x7, [[0xfe, 0x7, 0x5a77, 0x4, 0x6, 0x7fffffff, 0x80000001, 0x2e9a], [0x2c1, 0x6, 0x80, 0x1, 0x6, 0x7fff, 0x400, 0x9], [0x1, 0x7, 0x9, 0x1, 0xc4, 0x97, 0x0, 0x6707f0ae]], [], [{0xaa4, 0x8000, 0x0, 0x1, 0x1, 0x1}, {0xf7, 0x2, 0x0, 0x1}, {0x1, 0x80000000, 0x1, 0x0, 0x0, 0x1}, {0x8001, 0x0, 0x1, 0x1, 0x1, 0x1}, {0x4, 0x7d, 0x0, 0x1}, {0x200, 0xe8fd, 0x1, 0x1}, {0x3, 0x9b44, 0x1, 0x0, 0x0, 0x1}, {0x660c1f25, 0x17, 0x0, 0x1}, {0x7, 0x9, 0x1, 0x1}, {0x7, 0x6, 0x0, 0x0, 0x1}, {0x9, 0x80000000, 0x1, 0x1, 0x1, 0x1}, {0x4, 0x3, 0x1, 0x1, 0x1, 0x1}], [], 0xfff}) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) fcntl$getownex(r1, 0x10, &(0x7f0000001300)) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f00000012c0)={0x5, 0x75d0, 0x3, 0x3}) 19:30:50 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) syz_open_dev$char_usb(0xc, 0xb4, 0x7) 19:30:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4048ae9b, &(0x7f0000000080)={0x97ffffff, 0x6a00}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 679.864997][T25666] exFAT-fs (loop1): invalid boot record signature 19:30:51 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r2, &(0x7f0000000280), 0xfffffed3) ioctl$USBDEVFS_SETCONFIGURATION(r2, 0x80045505, &(0x7f0000000000)=0x74) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r3, &(0x7f0000000280), 0xfffffed3) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r3, &(0x7f0000001340)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000001300)={&(0x7f00000012c0)={0x28, 0x140d, 0x1, 0x70bd2d, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @RDMA_NLDEV_ATTR_RES_MRN={0x8, 0x3e, 0x3}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x20}, 0x4000840) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x61, &(0x7f00000002c0)={'filter\x00', 0x4}, 0x68) [ 679.913465][T25666] exFAT-fs (loop1): failed to recognize exfat type 19:30:51 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r3, &(0x7f0000000280), 0xfffffed3) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000040)={0x3, 0x6, 0x4, 0x400, 0x8, {r1, r2/1000+30000}, {0x5, 0x1, 0x0, 0xc1, 0xcb, 0xff, "01cd17d7"}, 0xfffffe01, 0x7, @offset=0x8d09, 0x5, 0x0, r3}) ioctl$RTC_IRQP_READ(r4, 0x8008700b, &(0x7f00000000c0)) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f0000000140)={0x9, [0x5, 0x2, 0x1, 0x8435, 0xdf5, 0x57, 0x99e4, 0x9, 0xcd, 0x8, 0x5, 0xfffc, 0x4, 0xf216, 0x1, 0x8, 0x3e4, 0x400, 0x9, 0x400, 0x8c5, 0x101, 0x309, 0xf3a, 0x0, 0x7, 0xf5, 0x8000, 0x6, 0x5, 0x20, 0xfffb, 0x3, 0x3, 0x9, 0x7, 0x9, 0xe, 0x5, 0x401, 0x2, 0xc000, 0x9e5b, 0x3ff, 0x20, 0x8, 0x1, 0x7fff], 0xb}) 19:30:51 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000001300)='/dev/dlm-control\x00', 0x50000, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x2) read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, &(0x7f00000002c0)=0x10, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r2, &(0x7f0000000280), 0xfffffed3) getsockopt$ARPT_SO_GET_INFO(r2, 0x0, 0x60, &(0x7f0000000300)={'filter\x00'}, &(0x7f0000000380)=0x44) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r3, 0x0) pivot_root(&(0x7f0000001280)='./file0\x00', &(0x7f00000012c0)='./file0\x00') ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x46, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x81, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:30:51 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x1a6c0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a3ffa1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4ea8c88e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be98f5cdaae5c40268ff5244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc", 0xde}, {&(0x7f0000000080)="9b2daabe8d8bb78bd983a8d5de0fa20606c649f952f3cb33a20c14e84796388cf2258eba2b23c7ac2d201f750cd5", 0x2e}], 0x1000000000000298, 0x9) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x64a7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x69040000, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:51 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_mr_cache\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) getpid() ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) semget(0x3, 0x5, 0x8) 19:30:51 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capabilisy\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:51 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x4000000000000016, &(0x7f00000004c0)) ptrace(0x4206, r1) ptrace(0x4203, r1) waitid(0x2, r1, &(0x7f00000002c0), 0x1, &(0x7f0000000340)) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:30:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4048ae9b, &(0x7f0000000080)={0x97ffffff, 0x6c00}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:30:51 executing program 0: getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000000)=0x78) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:30:51 executing program 5: prctl$PR_SET_ENDIAN(0x14, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000080)=""/166, 0xa6}, {&(0x7f0000001300)=""/49, 0x31}], 0x2, &(0x7f00000001c0)=""/100, 0x64}, 0x40002002) bpf$OBJ_GET_PROG(0x7, &(0x7f00000012c0)={&(0x7f0000001280)='./file0\x00', 0x0, 0x8}, 0x10) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000280)=0x1, 0x4) semget(0x3, 0x5, 0x0) [ 680.503004][T25723] exFAT-fs (loop1): invalid boot record signature [ 680.529887][T25723] exFAT-fs (loop1): failed to recognize exfat type 19:30:51 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capabilit\\\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:51 executing program 5: r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = syz_open_procfs(r0, &(0x7f0000000140)='net/ip6_flowlabel\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) read$midi(r1, &(0x7f0000000000)=""/222, 0xde) semget(0x0, 0x2, 0x14a) 19:30:51 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000300)={r1}) getsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000000340)=0x2a, &(0x7f0000000380)=0x1) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r4, &(0x7f0000000280), 0xfffffed3) sendmsg$IPCTNL_MSG_EXP_DELETE(r4, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x20c100, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r5, 0x541b, &(0x7f00000002c0)) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) setsockopt$RXRPC_SECURITY_KEY(r2, 0x110, 0x1, &(0x7f0000001280)='cmdline\x00', 0x8) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/autofs\x00', 0x1a0cd45cb67ff1dd, 0x0) ioctl$VT_ACTIVATE(r6, 0x5606, 0x7) listen(r0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000280), 0xfffffed3) close(0xffffffffffffffff) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:30:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x6a040000, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) [ 680.802702][T25755] exFAT-fs (loop1): invalid boot record signature [ 680.817063][T25755] exFAT-fs (loop1): failed to recognize exfat type 19:30:52 executing program 5: semget(0x3, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) setitimer(0x0, &(0x7f0000000040)={{r0, r1/1000+30000}, {0x77359400}}, 0x0) 19:30:52 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, r1) keyctl$get_security(0x11, r1, &(0x7f00000002c0)=""/208, 0xd0) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {0x1}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r2, &(0x7f0000000280), 0xfffffed3) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f0000001300)=""/123) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r3, &(0x7f0000000280), 0xfffffed3) rt_tgsigqueueinfo(0x0, 0x0, 0x4000000000000016, &(0x7f00000004c0)) ptrace(0x4206, 0x0) ptrace(0x4203, 0x0) ptrace(0x10, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400ddff", @ANYRES16=r5, @ANYBLOB="0100000000000000000004000000"], 0x14}}, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r3, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f0000001280)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="00082abd7000fddbdf2502000000400001800800080000000000060001000a000000140003cb0000000600000000000000000000000008000b00736970000600020062000000060004004e220000080004000300000004000280080005000300000008000400bb000000"], 0x70}, 0x1, 0x0, 0x0, 0x24000000}, 0x40) 19:30:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b75fb3488fd8015bba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377aba09e7b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4048ae9b, &(0x7f0000000080)={0x97ffffff, 0x7400}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:30:52 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0xfe, 0x93, 0x0, 0x9, 0x0, 0x82, 0x426, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x100b0, 0xfffffffffffffffd, 0x8, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000380)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='securityl\x03\x001\x00\x00\xbdz\x104y\x00'], &(0x7f0000000180)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9\x00\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000340)='f\xc6\x7f\x00\x00\x00\x00\x00\x00\x04', &(0x7f00000000c0)='}\x8c', &(0x7f0000000100)='security.capability\x00']) 19:30:52 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capabilite\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x6b040000, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:52 executing program 5: semget(0x3, 0x5, 0x29) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000000)=0x301, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) setfsuid(r1) 19:30:52 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f00000002c0)={0x2, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {0x0, 0x0, 0x35}, {0x0, 0x8, 0x0, [], 0x71}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0xfe, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {0x0, 0x0, 0x0, [], 0xaa}, {0x80, 0x0, 0x0, [], 0x9}, {0x8, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f0000000080)={0x9f0000, 0x0, 0xfff, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x990a6a, 0x4, [], @ptr=0x80}}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r3, &(0x7f0000000280), 0xfffffed3) r4 = gettid() write$cgroup_pid(r3, &(0x7f00000000c0)=r4, 0x12) fcntl$notify(r2, 0x402, 0x80000000) [ 681.080581][T25783] exFAT-fs (loop1): invalid boot record signature [ 681.095135][T25783] exFAT-fs (loop1): failed to recognize exfat type 19:30:52 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r2, &(0x7f0000000280), 0xfffffed3) fsconfig$FSCONFIG_SET_PATH_EMPTY(r1, 0x4, &(0x7f00000002c0)='\'.self:\x00', &(0x7f0000000300)='./file0\x00', r2) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:30:52 executing program 5: semget(0x3, 0x5, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000000)="66b9800000c00f326635010000000f30260f01c3f3d8d626f30f2a440d66b98800000066b80500000066ba000000000f300f78f16f66b8007000000f23c80f21f866350c0030000f23f867660f67edbaf80c66b874425d8966efbafc0c66b83000000066ef", 0x65}], 0x1, 0x10, &(0x7f00000000c0), 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x4000000000000016, &(0x7f00000004c0)) ptrace(0x4206, r2) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x2, 0x0) ioctl$SNDCTL_DSP_POST(r3, 0x5008, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r4, &(0x7f0000000280), 0xfffffed3) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r4, 0xc0845658, &(0x7f0000000140)={0x0, @bt={0x9, 0x7, 0x0, 0x3, 0xcb, 0x5, 0x4, 0x0, 0x1, 0x7e, 0x2, 0xf88, 0x9590c79, 0xa24, 0x19, 0x20, {0xfffffeff, 0x7}, 0x7f, 0x81}}) ptrace(0x4203, r2) sched_getscheduler(r2) 19:30:52 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x02'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x6c000000, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4048ae9b, &(0x7f0000000080)={0x97ffffff, 0x7a00}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:30:52 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0x0, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0xff, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {0x4}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:30:52 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r1, &(0x7f0000000280), 0xfffffed3) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r2, &(0x7f0000000280), 0xfffffed3) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001280)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}, 0x1}) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000000)=0x1, 0x4) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) [ 681.562175][T25820] exFAT-fs (loop1): invalid boot record signature [ 681.588563][T25820] exFAT-fs (loop1): failed to recognize exfat type 19:30:52 executing program 3: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r1) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x44240, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:52 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x1ff, @empty}, 0x1c) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x4}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x0, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x7}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) setsockopt$inet6_tcp_buf(r0, 0x6, 0xb, &(0x7f00000002c0)="673c475003ae128a15b003e75ffb2cd3e07fd45ed103c504d577d7c88275bc4c52ccd98a0626adbf89f3f742610ec317a3e5ee1e0ed8026b5947f30bfd01048e49818af215585bb3371670550478c9a003050f63e9d026b1b0a66f74ad2463fbd0bc03b16a321e6f7cd68e5f2315ba9ff35d55e26bdb5a21804f5f7767ed7212b17d411d76b28389882c6d496202dcaca51537", 0x93) 19:30:52 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3a9dd598323ccba827e9ff4cb6057fd86d3f7b3ee3aa62cf1846f91e4965ee41a783650eadbacfbc8c939226adb5afb2e71f433a6f6f23fe9eb197e03d8f04049b6377ebb44f1f892f0c27fb5db2c5f9a2ef39a49bd0002b7c6d3b64f23c07a5fb45b760b9a8a513c4e94bbf914ab3b8a6dc7b8a645606e56a694e7418c7d4e62f20b7aadee124e602a2bb070099db7f7f394eb563132027", 0x98, 0x0) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000480)="680294a336a1d0e5f15b469ddeb7895a63bc8b48ae6b2fbd087c3d878a09a030de999bf44b17070000000000000056389e910bb9f1d99a0fd1061aa6dffda7988e8786aff180844b266a7288c4c9ac4d7f980fecdfedc6372b3cd78cb3e4ad0012cb0d5777ec049785be6df29402589f68264b7547a18c80dfcc52a947361002303bc7fbaa95332dc4f4d12988e620895ba7bc183d5f05fdf63e1da5b66a987ff9e7e005b3d5f72a00f4f479be985244e01d71d0848ca8ed02d74b6ad3e2e19108163c016b6bbb7b2b2c95439942612f9ffe609c9ffc94bc56acd2c91ef0", 0xde}, {&(0x7f0000000100)}], 0x2, 0xd) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000000, r2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x6612, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002a25000000000000000000000000000000000000000000000000000000130ccbe0515bb48c0031674a6a84eed8eaed602530af882a17000000000000000000000000000000000000ef0000000000000000000000ff0100000000000020000000000000000700000000000000000000000000000000000000000000000000000080000000000000653baa4030cea29cbed28c9b00000000000000000000000001080000c4a2d275000200000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000af38c6e5c051c0310eadbf98456a90649f42923437dc655a"]) dup(0xffffffffffffffff) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x03'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 19:30:52 executing program 5: semget(0x3, 0x5, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) read$FUSE(0xffffffffffffffff, &(0x7f0000000280), 0xfffffed3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) r5 = getpgrp(0x0) setpriority(0x0, r5, 0xffff) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)={{0x1, 0x0, 0x0, r2, r3, 0x4, 0x7f}, 0x101, 0x7, 0x10001, 0xffff, r4, r5, 0x7fff}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f00000012c0)=0xc) setuid(r6) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r7) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000001280)='fuse\x00', 0x20028, &(0x7f0000001540)=ANY=[@ANYBLOB="f2bb21ba32a5c966e280", @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d30303030309692dbad468430303038370e3030303030253030303031303030302c757365625f69643d", @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r3, @ANYBLOB=',default_permissions,blksize=0x0000000000000800,blksize=0x0000000000001000,blksize=0x0000000000000800,euid=', @ANYRESDEC=r6, @ANYBLOB=',smackfshat=,fowner<', @ANYRESDEC=r7, @ANYBLOB=',\x00']) write$UHID_CREATE(r0, &(0x7f0000000100)={0x0, {'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/204, 0xcc, 0x7, 0x7, 0x2, 0x2, 0x10000}}, 0x120) 19:30:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./file0\x00', 0x6c040000, 0x0, 0x0, 0x0, &(0x7f00000018c0)={[{@discard='discard'}]}) 19:30:52 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @empty}, 0x1c) listen(r0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x0, 0x5, 0x0, 0x0, 0x0, [{0xff, 0x0, 0x81}, {0x3}, {0x1, 0x3c, 0x34}, {0x0, 0x0, 0x0, [], 0x8}, {}, {0x0, 0x8, 0x0, [], 0x6d}, {0x0, 0x48, 0x1, [], 0x1}, {0x0, 0x0, 0x0, [], 0x7f}, {0x0, 0x2, 0x1}, {0x5, 0x0, 0x0, [], 0xd7}, {0x9, 0x0, 0x0, [], 0x6}, {0x5}, {0x0, 0x1f, 0x0, [], 0x4}, {0x0, 0x0, 0x4, [], 0x81}, {}, {}, {}, {}, {0x80, 0x0, 0x0, [], 0x9}, {0xff, 0x0, 0x8}, {0x0, 0x0, 0x0, [], 0x1f}, {0xbd, 0x0, 0x0, [], 0x3}, {0x0, 0x0, 0x0, [], 0x1}, {0x7}]}}) 19:30:52 executing program 4: dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) openat$autofs(0xfff