x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 859.397286][T19462] FAT-fs (loop2): Directory bread(block 2563) failed [ 859.450291][T19462] FAT-fs (loop2): Directory bread(block 2564) failed [ 859.480991][T19462] FAT-fs (loop2): Directory bread(block 2565) failed [ 859.541484][T19462] FAT-fs (loop2): Directory bread(block 2566) failed [ 859.586338][T19462] FAT-fs (loop2): Directory bread(block 2567) failed [ 859.630267][T19462] FAT-fs (loop2): Directory bread(block 2568) failed [ 859.655173][T19462] FAT-fs (loop2): Directory bread(block 2569) failed [ 859.668177][T19462] FAT-fs (loop2): Directory bread(block 2570) failed 03:19:41 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1f5, 0x400000000000) 03:19:41 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) r2 = syz_open_dev$loop(0x0, 0x2, 0x0) r3 = getpgid(0x0) r4 = perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x2) syz_open_procfs(r3, &(0x7f0000000480)='timers\x00') dup2(r2, r2) r5 = syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x8) ioctl$TIOCGPTLCK(r6, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r6, 0x2, &(0x7f0000000140)=[r7, r6, r4], 0x3) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r8) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r7, &(0x7f0000000240)={0x10000008}) fsetxattr$trusted_overlay_upper(r6, &(0x7f0000000440)='trusted.overlay.upper\x00', &(0x7f0000000500)={0x0, 0xfb, 0x7e, 0x2, 0x6630, "7a7f66fa9ab0ad490c2a80361ce57515", "e0fc0a63d4f7ab8947f7084c94f610ac6ec66c24cda5acb1aa9c183cf1e2787cb206d7df538924b4be5267d5df47c703c5e9bac7266478fad44a46e59ef6632eabbfb0a81fee373966ddcd28342191e481125073c0369bd158b4549a5869d84eae8c4b4755d30ec58c"}, 0x7e, 0x1) 03:19:41 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:41 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204011002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:41 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1f6, 0x400000000000) 03:19:41 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:41 executing program 3: r0 = syz_open_dev$loop(0x0, 0x2, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) fstat(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getgid() ioctl$KVM_SET_GSI_ROUTING(r3, 0x4008ae6a, &(0x7f0000000500)={0x7, 0x0, [{0x0, 0x6, 0x0, 0x0, @irqchip={0x3ff, 0x8001}}, {0x1fcdf923, 0x5, 0x0, 0x0, @irqchip={0x6, 0xd9}}, {0x8, 0x0, 0x0, 0x0, @irqchip={0x50, 0xffff}}, {0x0, 0x0, 0x0, 0x0, @msi={0x7ff, 0x2, 0x1}}, {0x10000, 0x4, 0x0, 0x0, @adapter={0x3, 0x10000, 0x81, 0x9, 0x2}}, {0x2, 0x1, 0x0, 0x0, @adapter={0x0, 0x4, 0x3f, 0x3f, 0x22}}, {0xffffffffffffff16, 0x7, 0x0, 0x0, @irqchip={0x9, 0x1}}]}) write$P9_RGETATTR(r3, &(0x7f0000000400)={0xa0, 0x19, 0x2, {0x11, {0x10, 0x0, 0x3}, 0x180, r5, r6, 0x8, 0x1000, 0x0, 0x8e1, 0x4, 0xff, 0xfffffffffffffffa, 0x8, 0x6, 0x3, 0x3f, 0x4, 0x4312, 0x2, 0xc5b6}}, 0xa0) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r4, r3, r2], 0x3) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r7) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r3, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:41 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1f7, 0x400000000000) 03:19:42 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 860.428212][T19522] FAT-fs (loop2): Directory bread(block 4097) failed 03:19:42 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:42 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1f8, 0x400000000000) [ 860.509029][T19522] FAT-fs (loop2): Directory bread(block 4098) failed [ 860.565971][T19522] FAT-fs (loop2): Directory bread(block 4099) failed [ 860.640244][T19522] FAT-fs (loop2): Directory bread(block 4100) failed [ 860.687798][T19522] FAT-fs (loop2): Directory bread(block 4101) failed 03:19:42 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 860.767357][T19522] FAT-fs (loop2): Directory bread(block 4102) failed [ 860.798900][T19522] FAT-fs (loop2): Directory bread(block 4103) failed 03:19:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) r2 = syz_open_dev$loop(0x0, 0x2, 0x0) r3 = getpgid(0x0) r4 = perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x2) syz_open_procfs(r3, &(0x7f0000000480)='timers\x00') dup2(r2, r2) r5 = syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x8) ioctl$TIOCGPTLCK(r6, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r6, 0x2, &(0x7f0000000140)=[r7, r6, r4], 0x3) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r8) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r7, &(0x7f0000000240)={0x10000008}) fsetxattr$trusted_overlay_upper(r6, &(0x7f0000000440)='trusted.overlay.upper\x00', &(0x7f0000000500)={0x0, 0xfb, 0x7e, 0x2, 0x6630, "7a7f66fa9ab0ad490c2a80361ce57515", "e0fc0a63d4f7ab8947f7084c94f610ac6ec66c24cda5acb1aa9c183cf1e2787cb206d7df538924b4be5267d5df47c703c5e9bac7266478fad44a46e59ef6632eabbfb0a81fee373966ddcd28342191e481125073c0369bd158b4549a5869d84eae8c4b4755d30ec58c"}, 0x7e, 0x1) [ 860.834528][T19522] FAT-fs (loop2): Directory bread(block 4104) failed [ 860.861499][T19522] FAT-fs (loop2): Directory bread(block 4105) failed 03:19:42 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1f9, 0x400000000000) [ 860.884059][T19522] FAT-fs (loop2): Directory bread(block 4106) failed 03:19:42 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731f"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:42 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010003000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:42 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, &(0x7f0000000380)=""/135) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:42 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(0x0, &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:42 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fa, 0x400000000000) 03:19:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fb, 0x400000000000) 03:19:43 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731f"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:43 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(0x0, &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:43 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fc, 0x400000000000) 03:19:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) r2 = syz_open_dev$loop(0x0, 0x2, 0x0) r3 = getpgid(0x0) r4 = perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x2) syz_open_procfs(r3, &(0x7f0000000480)='timers\x00') dup2(r2, r2) r5 = syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x8) ioctl$TIOCGPTLCK(r6, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r6, 0x2, &(0x7f0000000140)=[r7, r6, r4], 0x3) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r8) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r7, &(0x7f0000000240)={0x10000008}) 03:19:43 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010005000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:43 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731f"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:43 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(0x0, &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fd, 0x400000000000) 03:19:43 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x54) 03:19:44 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', 0x0, 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:44 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:44 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010006000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) r2 = syz_open_dev$loop(0x0, 0x2, 0x0) r3 = getpgid(0x0) r4 = perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x2) syz_open_procfs(r3, &(0x7f0000000480)='timers\x00') dup2(r2, r2) r5 = syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x8) ioctl$TIOCGPTLCK(r6, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r6, 0x2, &(0x7f0000000140)=[r7, r6, r4], 0x3) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r8) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000002) 03:19:44 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-monitor\x00', 0x600001, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000480)=0xe8) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r4, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000140)=[r5, r4, r1], 0x3) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@ipv4={[], [], @initdev}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@empty}}, &(0x7f00000009c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r4, &(0x7f0000000f40)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000f00)={&(0x7f0000000a00)={0x4dc, r6, 0x30, 0x70bd28, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf4, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r3}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r3}, {0x1e0, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xfff}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x3a1e}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9ac}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x401}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xe6}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x100}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x1, 0x3ff, 0x5303cd2, 0x1}]}}}]}}, {{0x8, 0x1, r3}, {0x1dc, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x6e}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r3}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffe}}}]}}]}, 0x4dc}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000c0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f0000000680)={0x2, 0x0, [], {0x0, @bt={0x101, 0x4, 0x1, 0x3, 0x81, 0x20, 0x3, 0xbc9, 0x4, 0x4, 0x98, 0x400, 0x9, 0x4, 0x1d, 0x10}}}) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r2, 0xc0305602, &(0x7f0000000500)={0x0, 0x60, 0x701f}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r8) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000003) 03:19:45 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', 0x0, 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:45 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000004) 03:19:45 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:45 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010007000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:45 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000005) 03:19:45 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', 0x0, 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) r2 = syz_open_dev$loop(0x0, 0x2, 0x0) r3 = getpgid(0x0) r4 = perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x2) syz_open_procfs(r3, &(0x7f0000000480)='timers\x00') dup2(r2, r2) r5 = syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x8) ioctl$TIOCGPTLCK(r6, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r6, 0x2, &(0x7f0000000140)=[r7, r6, r4], 0x3) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r8) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:45 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000400)='/dev/cachefiles\x00', 0x42c102, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000080}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x70, r2, 0x310, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e21}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x68682b28}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x49}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x800}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}]}, 0x70}}, 0x0) r3 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r4, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000140)=[r5, r4, r3], 0x3) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r6) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:45 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:45 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000006) 03:19:45 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:46 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) sendmmsg$alg(r2, &(0x7f0000000e80)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000380)="5917cdce6c516e5218dd7c1ccfc75350b11a869219bd9946de3258c49c0eaeb97a88f093dab4ce582a94bd72ffcb4da76a09f95f1a7f2d62ceecfdc082331248697bef96902dc43156d258edaeeee7ce2248f7db4d73ef8b12260ab6d5", 0x5d}, {&(0x7f0000000400)="d8197d965a16b241754087e09a85859587c965c1321e049b7717eddde42c2908dbbb282a89d50b8ac8dd9392457658f2c6e833bb65225c40c0b5ec918d6981a42b6acb43f6c9a9547703196373c526bcb6e631f5d2adff63ce83e0903c285f03ddd33c3368e8db88f999ddc358d8673852852e32b028e413e2", 0x79}], 0x2, &(0x7f0000000500)=[@iv={0xf0, 0x117, 0x2, 0xdb, "c8e756aadfe8a6c065040856e6373b70c5ae6ed9b086d886b05914c2f6d0b1877316cf8111ec3b416a4432bd184ada6489a7236f3efe710a9880476b86c26268cc10a983e06115d304b1c83d15954537b261d889fefc81cb76e48d62378ba1faf38984a87837627d4962d04ab00814e69057ead8e59096a589b97b8e734953481d1a9c225ec1ee1a6ecb1e0a2b39671289ef5278fe0beadda5182bcbbb726e02861aeaf8bb285b9eaf9e59bd4da648491864be515fd13aa189327746045526897e265e32e11b1f705f715584fc4eb0339f9649d5eb9ae62f735469"}, @iv={0x60, 0x117, 0x2, 0x47, "c1ddd3543dd2ec389cd612bd39830dcd1a29cd4d77a585bdd106b543d5b32edf0f88f7f116127d00643e067808f97e9ceecede6fe05ca443a1642f87bd7ee70167471330f6e13e"}], 0x150, 0x20000000}, {0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000680)="020e17ce9eb60d77fb87fe7a71df91817006d1136fac2ba10224ebde41574a730f40f016b62c964c812435a82447e8243eec192dfb54bb3a24c7586d71892ee6ba7e0943769b73d492fe3bc68536175a7140a825b84436fee8bd6736985e3a9da3fa38a12f3c1b5b34f9a124e3a73ae8208d11e0e652b3d943073ad59eca87c0156d90144a123a55be6c9b9b1a4080b890b2935455e18c956bf75b8a65f5f23cf5abc71d397f550aaa83857b0b594ad72a0bb814e02f014d27a4b4db4ad46fcc57649db9fe040a3d384e29aa16673af623048875a12e5ac85bce92d668f9a537024fe024d277a05ca5febc649a86e71d", 0xf0}, {&(0x7f0000000780)="3b24526eecf6db32a121f2ac2724fdf961ecb4ec860f4b20c91454a21bf4e0e15301069ee8fff520db3ecab8f9b9c38b00451fd410b5e505db926f26253bf6979bf59ed357b2862d", 0x48}, {&(0x7f0000000800)="8258e9ed5bf3dd822c41ea7ddb1a63423bb55ad04e8b5563d6b43fd731f9ded0117be318631764b7b640976805d2bc5ac0a369b4a4bb819151ef5fe6c1de3978ec719a81659bdfe2d47e4f27959c0d296c81b39ff1388d8175b89f20", 0x5c}, {&(0x7f0000000880)="22546749e89c6c39e578321f2573eafeae483b5a1048ea7bfb6d6f7975a190a745c15d60195e3013eb1adff33fd07f96bc427252724f95742760a8ecd6a7e7f8bcaf830e88c2d9d57269fb52", 0x4c}, {&(0x7f0000000900)="dabd202eb628ad1306ed9610bc16534060e9371abd29431e26bf399d604b456c8c68b48afb783bcc4e2450c299cc84a3d6e16fcbe8415787d8bed7a59e42cbd40a1dda41f1abda9d7e468312162eeeff592e5df504abd7f440394037863a43ac7390c3c96c1ae33d32642daaded302f3941e323ec3719eec4163dad23b3d51a3d970528282b52cd2c38f59b9658347462a06ced0e45acb5ae717ddd214958ee625219c2a5eb4af61ef9b1cf845a89407263b0f2600bde268d4005607b6dbe7c31d637cc6a8f10d55b070e460f0865b0b48394bec3592b17826", 0xd9}, {&(0x7f0000000a00)="681a998537e12de1ea72f94483c6c45de72d156e491e7c58dfe38799a7af7d1e158872c22779754035a2dc18bb6208d5f3ad18abcecdfa15da7d45e7935cf8409441925f9aabc06126753e234e280d614214268f40fb340bef983239d158628810c2779b0b11d793cf70b6f9b633873373311933ceaf55dc90d2d0ac151fa32811d3928886414cf0ef4de6fb47ae263713b9dc649e20b8e8c7667bcff11eeb3cf5fe", 0xa2}, {&(0x7f0000000ac0)="363a271ea5c5a0f3e04cdac75b198f6d916a0c460db571f2989f0f9e6a5ed9b5512c0ac77bf6c0f9bb6f905842221e43a8798617baa78ce31cdc077621c3f84962f069f64e4938cb", 0x48}, {&(0x7f0000000b40)="dee7d4c5932edf60df0b08720d67b07cc9f559186509ddb4a0da4d33097787b6882af9d2fd2453c863500dd927574514857cca2397b69f30f7d11b141b1d671c3f526fbee47be1be28d20f16fe349428fa66971659160854252267c1e201cb71b635d139a55b09217b84a6510f690700a01293bd4c826e877e3e2da76131014e5fb8a97057bb94e61c924a8c6b202ed9c0b90af4f0ee", 0x96}], 0x8, &(0x7f0000000c80)=[@iv={0xf0, 0x117, 0x2, 0xd7, "9aac305f3f6513f372bd5b091a326b0dbb804b8682582568cd52aab4600232c9f442e084097aa173f7b8012268762d9d5fca85ea1d932f23ac47d25cb720ab34b875abb63d8d69b708124631b69e7036fa39f2f5ca9cee95af0772e6a0fbf7d9f010c6bbda781457167ca0b4db953a8b9ba67df0d4308aad36e5b162150bdecc0166211500113b841e34d9c10f6b34354be64a9c4b17101ef39a4eb27c12b1fd7444508abd1a84f15ea7dd9feeda39ef1571251df726158c22614289b03627c086e39485ae5572e050a4033ee7d79a8d5938a3348b4fbb"}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x7}, @op={0x18}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x90, 0x117, 0x2, 0x7b, "d0e9cdfbc989f8aa06ee74f52287d964d8c1eb04b7884a25783392ecc4a1d1c5ae9f331e827f5856ba36c8e18e9aa8e76564015e994c923c042256cbf1478115ad84cf4bd1931f6fe4d1e6fef91b36c6fdd30224632e88cdc0535b9ebc89d016eff85503357e9d9ab7e4207105aea7018cb567ef394c1ccae8f7dc"}], 0x1e0, 0x800}], 0x2, 0x4000000) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:46 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000a000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:46 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000007) 03:19:46 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b3532"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 864.645777][T19787] FAT-fs (loop5): bogus number of reserved sectors [ 864.698987][T19787] FAT-fs (loop5): Can't find a valid FAT filesystem 03:19:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) r2 = syz_open_dev$loop(0x0, 0x2, 0x0) r3 = getpgid(0x0) r4 = perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x2) syz_open_procfs(r3, &(0x7f0000000480)='timers\x00') dup2(r2, r2) r5 = syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x8) ioctl$TIOCGPTLCK(r6, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r6, 0x2, &(0x7f0000000140)=[r7, r6, r4], 0x3) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r8) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:46 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x40000000000a) 03:19:46 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:46 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0xaaaab5e, &(0x7f0000000380)=[{&(0x7f0000000240)="eb3c906d6b66732e666174000204010002000270f7f8", 0xfffffffffffffefd}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:46 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010014000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000010) 03:19:47 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b3532"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 865.310556][T19827] FAT-fs (loop5): bogus number of reserved sectors [ 865.348889][T19827] FAT-fs (loop5): Can't find a valid FAT filesystem 03:19:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000048) 03:19:47 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) r2 = syz_open_dev$loop(0x0, 0x2, 0x0) r3 = getpgid(0x0) r4 = perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x2) syz_open_procfs(r3, &(0x7f0000000480)='timers\x00') dup2(r2, r2) r5 = syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x8) ioctl$TIOCGPTLCK(r6, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r6, 0x2, &(0x7f0000000140)=[r7, r6, r4], 0x3) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r8) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:47 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b3532"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:47 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401001e000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x40000000004c) [ 866.146275][T19870] FAT-fs (loop5): bogus number of reserved sectors [ 866.219063][T19870] FAT-fs (loop5): Can't find a valid FAT filesystem 03:19:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000068) 03:19:48 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x0) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:48 executing program 3: r0 = getpgrp(0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x4) syz_open_dev$loop(0x0, 0x2, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="caf40b"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r4, r3, r2], 0x3) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) r2 = syz_open_dev$loop(0x0, 0x2, 0x0) r3 = getpgid(0x0) r4 = perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x2) syz_open_procfs(r3, &(0x7f0000000480)='timers\x00') dup2(r2, r2) r5 = syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x8) ioctl$TIOCGPTLCK(r6, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r6, 0x2, &(0x7f0000000140)=[r7, r6, r4], 0x3) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r8) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:48 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x40000000006c) 03:19:48 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010040000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 866.806012][T19910] FAT-fs (loop5): bogus number of reserved sectors [ 866.851841][T19910] FAT-fs (loop5): Can't find a valid FAT filesystem 03:19:48 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x0) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) r2 = syz_open_dev$loop(0x0, 0x2, 0x0) r3 = getpgid(0x0) r4 = perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x2) syz_open_procfs(r3, &(0x7f0000000480)='timers\x00') dup2(r2, r2) r5 = syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x8) ioctl$TIOCGPTLCK(r6, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r6, 0x2, &(0x7f0000000140)=[r7, r6, r4], 0x3) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r8) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000074) 03:19:48 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffff9c, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:48 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x40000000007a) 03:19:49 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e6661740002040100ff000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:49 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x0) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 867.513912][T19954] FAT-fs (loop5): bogus number of reserved sectors 03:19:49 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000300) [ 867.576172][T19954] FAT-fs (loop5): Can't find a valid FAT filesystem 03:19:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) r2 = syz_open_dev$loop(0x0, 0x2, 0x0) r3 = getpgid(0x0) r4 = perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x2) syz_open_procfs(r3, &(0x7f0000000480)='timers\x00') dup2(r2, r2) r5 = syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x8) ioctl$TIOCGPTLCK(r6, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r6, 0x2, &(0x7f0000000140)=[r7, r6, r4], 0x3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:49 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:49 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000500) 03:19:49 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000580)='/dev/input/mice\x00', 0x0, 0x301002) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x7) syz_open_dev$loop(0x0, 0x2, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r5, r3, r2], 0x3) move_mount(r3, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x2) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e23, @rand_addr=0x9}}, [0x9, 0x6, 0x0, 0x4, 0xffffffffffff0001, 0xff, 0x564, 0x6, 0x5, 0x0, 0x444, 0x8, 0x0, 0xb1, 0x2]}, &(0x7f0000000240)=0x100) ioctl$UI_DEV_DESTROY(r4, 0x5502) syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x0, 0x0) r7 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) add_key(0x0, 0x0, &(0x7f0000000400)="aa803199a0e537df8894c81eaaeafa1f06ea0caa17fa2866f84b08278099ddb8572d6681dc3f66df6bbf6e3efc61cb57c6b6eb14bee8d7082d9f324ce090c58210d0387b427e09db9c4233934aa0a6a7", 0x50, 0x0) r8 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r7, r8, r8}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) sched_yield() setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000480)={r6, 0x1}, 0x8) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r9) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r3, 0x8912, &(0x7f0000000540)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000500)='./file0\x00', 0x4) 03:19:49 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 868.148352][T19993] FAT-fs (loop5): bogus number of reserved sectors [ 868.185206][T19993] FAT-fs (loop5): Can't find a valid FAT filesystem 03:19:49 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000600) 03:19:49 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010003000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:50 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x0, &(0x7f0000000040), 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) r2 = syz_open_dev$loop(0x0, 0x2, 0x0) r3 = getpgid(0x0) r4 = perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x2) syz_open_procfs(r3, &(0x7f0000000480)='timers\x00') dup2(r2, r2) r5 = syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x8) ioctl$TIOCGPTLCK(r6, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r6, 0x2, &(0x7f0000000140)=[r7, r6, r4], 0x3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:50 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000700) 03:19:50 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 868.731154][T20032] FAT-fs (loop5): bogus number of reserved sectors 03:19:50 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000580)='/dev/input/mice\x00', 0x0, 0x301002) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x7) syz_open_dev$loop(0x0, 0x2, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r5, r3, r2], 0x3) move_mount(r3, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x2) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e23, @rand_addr=0x9}}, [0x9, 0x6, 0x0, 0x4, 0xffffffffffff0001, 0xff, 0x564, 0x6, 0x5, 0x0, 0x444, 0x8, 0x0, 0xb1, 0x2]}, &(0x7f0000000240)=0x100) ioctl$UI_DEV_DESTROY(r4, 0x5502) syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x0, 0x0) r7 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) add_key(0x0, 0x0, &(0x7f0000000400)="aa803199a0e537df8894c81eaaeafa1f06ea0caa17fa2866f84b08278099ddb8572d6681dc3f66df6bbf6e3efc61cb57c6b6eb14bee8d7082d9f324ce090c58210d0387b427e09db9c4233934aa0a6a7", 0x50, 0x0) r8 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r7, r8, r8}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) sched_yield() setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000480)={r6, 0x1}, 0x8) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r9) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r3, 0x8912, &(0x7f0000000540)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000500)='./file0\x00', 0x4) [ 868.793656][T20032] FAT-fs (loop5): Can't find a valid FAT filesystem 03:19:50 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000a00) 03:19:50 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x0, &(0x7f0000000040), 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:50 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010004000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:50 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) r2 = syz_open_dev$loop(0x0, 0x2, 0x0) r3 = getpgid(0x0) r4 = perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x2) syz_open_procfs(r3, &(0x7f0000000480)='timers\x00') dup2(r2, r2) r5 = syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x8) ioctl$TIOCGPTLCK(r6, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r6, 0x2, &(0x7f0000000140)=[r7, r6, r4], 0x3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:51 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000004000) [ 869.451200][T20066] FAT-fs (loop5): bogus number of reserved sectors [ 869.482293][T20066] FAT-fs (loop5): Can't find a valid FAT filesystem 03:19:51 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000580)='/dev/input/mice\x00', 0x0, 0x301002) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x7) syz_open_dev$loop(0x0, 0x2, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r5, r3, r2], 0x3) move_mount(r3, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x2) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e23, @rand_addr=0x9}}, [0x9, 0x6, 0x0, 0x4, 0xffffffffffff0001, 0xff, 0x564, 0x6, 0x5, 0x0, 0x444, 0x8, 0x0, 0xb1, 0x2]}, &(0x7f0000000240)=0x100) ioctl$UI_DEV_DESTROY(r4, 0x5502) syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x0, 0x0) r7 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) add_key(0x0, 0x0, &(0x7f0000000400)="aa803199a0e537df8894c81eaaeafa1f06ea0caa17fa2866f84b08278099ddb8572d6681dc3f66df6bbf6e3efc61cb57c6b6eb14bee8d7082d9f324ce090c58210d0387b427e09db9c4233934aa0a6a7", 0x50, 0x0) r8 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r7, r8, r8}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) sched_yield() setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000480)={r6, 0x1}, 0x8) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r9) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r3, 0x8912, &(0x7f0000000540)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000500)='./file0\x00', 0x4) 03:19:51 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000004800) 03:19:51 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x0, &(0x7f0000000040), 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:51 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010005000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:51 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000004c00) 03:19:51 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 870.062919][T20106] FAT-fs (loop5): bogus number of reserved sectors [ 870.132326][T20106] FAT-fs (loop5): Can't find a valid FAT filesystem 03:19:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) r2 = syz_open_dev$loop(0x0, 0x2, 0x0) r3 = getpgid(0x0) r4 = perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x2) syz_open_procfs(r3, &(0x7f0000000480)='timers\x00') dup2(r2, r2) r5 = syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x8) ioctl$TIOCGPTLCK(r6, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r6, 0x2, &(0x7f0000000140)=[r7, r6, r4], 0x3) fchdir(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:51 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000006800) 03:19:52 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{0x0}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:52 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010004000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:52 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000006c00) 03:19:52 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:52 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010006000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 870.724401][T20145] FAT-fs (loop5): bogus number of reserved sectors [ 870.772421][T20145] FAT-fs (loop5): Can't find a valid FAT filesystem 03:19:52 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{0x0}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:52 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000007400) 03:19:52 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010004000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) r2 = syz_open_dev$loop(0x0, 0x2, 0x0) r3 = getpgid(0x0) r4 = perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x2) syz_open_procfs(r3, &(0x7f0000000480)='timers\x00') dup2(r2, r2) r5 = syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x8) ioctl$TIOCGPTLCK(r6, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r6, 0x2, &(0x7f0000000140)=[r7, r6, r4], 0x3) fchdir(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:52 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:52 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000007a00) [ 871.337319][T20183] FAT-fs (loop5): bogus number of reserved sectors [ 871.447126][T20183] FAT-fs (loop5): Can't find a valid FAT filesystem 03:19:53 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000100000) 03:19:53 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010007000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:53 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:53 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{0x0}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000f0ff7f) 03:19:53 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400001000000) [ 872.187746][T20234] FAT-fs (loop5): bogus number of reserved sectors 03:19:54 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 872.291215][T20234] FAT-fs (loop5): Can't find a valid FAT filesystem 03:19:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) r2 = syz_open_dev$loop(0x0, 0x2, 0x0) r3 = getpgid(0x0) r4 = perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x2) syz_open_procfs(r3, &(0x7f0000000480)='timers\x00') dup2(r2, r2) r5 = syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x8) ioctl$TIOCGPTLCK(r6, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r6, 0x2, &(0x7f0000000140)=[r7, r6, r4], 0x3) fchdir(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:54 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400002000000) 03:19:54 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010008000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400003000000) [ 872.792780][T20265] FAT-fs (loop5): bogus number of reserved sectors [ 872.828373][T20265] FAT-fs (loop5): Can't find a valid FAT filesystem 03:19:54 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400004000000) 03:19:54 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:54 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400005000000) 03:19:55 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000a000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 873.384781][T20297] FAT-fs (loop5): bogus number of reserved sectors 03:19:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) r2 = syz_open_dev$loop(0x0, 0x2, 0x0) r3 = getpgid(0x0) perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x2) syz_open_procfs(r3, &(0x7f0000000480)='timers\x00') dup2(r2, r2) r4 = syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x8) ioctl$TIOCGPTLCK(r5, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r6) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 873.435758][T20297] FAT-fs (loop5): Can't find a valid FAT filesystem 03:19:55 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1, 0xffffffffffffffff], 0x3) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:55 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400006000000) 03:19:55 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:55 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:55 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400007000000) [ 874.061332][T20343] FAT-fs (loop5): bogus number of reserved sectors 03:19:55 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1, 0xffffffffffffffff], 0x3) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 874.106698][T20343] FAT-fs (loop5): Can't find a valid FAT filesystem 03:19:55 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:55 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010010000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:55 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x40000a000000) 03:19:56 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010008000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:56 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400020000480) 03:19:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) r2 = syz_open_dev$loop(0x0, 0x2, 0x0) r3 = getpgid(0x0) perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x2) syz_open_procfs(r3, &(0x7f0000000480)='timers\x00') dup2(r2, r2) r4 = syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x8) ioctl$TIOCGPTLCK(r5, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r6) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 874.669556][T20373] FAT-fs (loop5): bogus number of reserved sectors [ 874.730211][T20373] FAT-fs (loop5): Can't find a valid FAT filesystem 03:19:56 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1, 0xffffffffffffffff], 0x3) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:56 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:56 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400040000000) 03:19:56 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010008000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:56 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010014000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:57 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400048000000) 03:19:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) r2 = syz_open_dev$loop(0x0, 0x2, 0x0) r3 = getpgid(0x0) perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x2) syz_open_procfs(r3, &(0x7f0000000480)='timers\x00') dup2(r2, r2) r4 = syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) r5 = openat$cgroup_ro(r4, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x8) ioctl$TIOCGPTLCK(r5, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r6) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 875.370261][T20418] FAT-fs (loop5): bogus number of reserved sectors 03:19:57 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r1], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 875.439519][T20418] FAT-fs (loop5): Can't find a valid FAT filesystem 03:19:57 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:57 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x40004c000000) 03:19:57 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:57 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r1], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:57 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x40005fffeb80) [ 876.018288][T20453] FAT-fs (loop5): bogus number of reserved sectors [ 876.071661][T20453] FAT-fs (loop5): Can't find a valid FAT filesystem 03:19:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) r2 = syz_open_dev$loop(0x0, 0x2, 0x0) r3 = getpgid(0x0) r4 = perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x2) syz_open_procfs(r3, &(0x7f0000000480)='timers\x00') dup2(r2, r2) r5 = syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x8) ioctl$TIOCGPTLCK(r6, 0x80045439, &(0x7f0000000300)) io_uring_register$IORING_REGISTER_FILES(r6, 0x2, &(0x7f0000000140)=[r7, r6, r4], 0x3) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r8) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:57 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401001e000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:57 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:58 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:58 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400068000000) [ 876.589851][T20490] FAT-fs (loop5): invalid media value (0x00) [ 876.623972][T20490] FAT-fs (loop5): Can't find a valid FAT filesystem 03:19:58 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r1], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:58 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x40006c000000) 03:19:58 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:58 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000fff0270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:58 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) r2 = syz_open_dev$loop(0x0, 0x2, 0x0) r3 = getpgid(0x0) r4 = perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x2) syz_open_procfs(r3, &(0x7f0000000480)='timers\x00') dup2(r2, r2) r5 = syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x8) ioctl$TIOCGPTLCK(r6, 0x80045439, &(0x7f0000000300)) io_uring_register$IORING_REGISTER_FILES(r6, 0x2, &(0x7f0000000140)=[r7, r6, r4], 0x3) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r8) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:58 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400074000000) 03:19:59 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, 0xffffffffffffffff, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 877.376867][T20526] FAT-fs (loop2): bogus number of directory entries (767) [ 877.442691][T20531] FAT-fs (loop5): invalid media value (0x00) [ 877.476189][T20526] FAT-fs (loop2): Can't find a valid FAT filesystem [ 877.482972][T20531] FAT-fs (loop5): Can't find a valid FAT filesystem 03:19:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x40007a000000) 03:19:59 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:59 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) 03:19:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) r2 = syz_open_dev$loop(0x0, 0x2, 0x0) r3 = getpgid(0x0) r4 = perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x2) syz_open_procfs(r3, &(0x7f0000000480)='timers\x00') dup2(r2, r2) r5 = syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x8) ioctl$TIOCGPTLCK(r6, 0x80045439, &(0x7f0000000300)) io_uring_register$IORING_REGISTER_FILES(r6, 0x2, &(0x7f0000000140)=[r7, r6, r4], 0x3) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r8) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:59 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002020270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:19:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x40007ffff000) [ 878.011068][T20564] FAT-fs (loop5): invalid media value (0x00) 03:19:59 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, 0xffffffffffffffff, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 878.081555][T20564] FAT-fs (loop5): Can't find a valid FAT filesystem 03:19:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400080040020) 03:20:00 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 878.364490][T20580] FAT-fs (loop2): bogus number of directory entries (514) 03:20:00 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) [ 878.431275][T20580] FAT-fs (loop2): Can't find a valid FAT filesystem 03:20:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400080ebff5f) 03:20:00 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, 0xffffffffffffffff, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 878.689842][T20604] FAT-fs (loop5): invalid media value (0x00) [ 878.726450][T20604] FAT-fs (loop5): Can't find a valid FAT filesystem 03:20:00 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002030270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:00 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) 03:20:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) r2 = syz_open_dev$loop(0x0, 0x2, 0x0) r3 = getpgid(0x0) r4 = perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x2) syz_open_procfs(r3, &(0x7f0000000480)='timers\x00') dup2(r2, r2) r5 = syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x8) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r6, 0x2, &(0x7f0000000140)=[r7, r6, r4], 0x3) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r8) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:00 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x4000dafcffff) [ 879.141316][T20631] FAT-fs (loop2): bogus number of directory entries (515) 03:20:00 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 879.229342][T20631] FAT-fs (loop2): Can't find a valid FAT filesystem 03:20:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x4000f5ffffff) 03:20:00 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 879.273031][T20644] FAT-fs (loop5): invalid media value (0x00) [ 879.287731][T20644] FAT-fs (loop5): Can't find a valid FAT filesystem 03:20:01 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x4000fffffcda) 03:20:01 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002040270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) r2 = syz_open_dev$loop(0x0, 0x2, 0x0) r3 = getpgid(0x0) r4 = perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x2) syz_open_procfs(r3, &(0x7f0000000480)='timers\x00') dup2(r2, r2) r5 = syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x8) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r6, 0x2, &(0x7f0000000140)=[r7, r6, r4], 0x3) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r8) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:01 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:01 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x4000fffffff5) 03:20:01 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:01 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x7, 0x889e}, &(0x7f0000000040)=0xc) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000080)={r1, @in6={{0xa, 0x4e20, 0x0, @empty, 0xb517}}}, 0x84) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 880.138154][T20685] FAT-fs (loop5): invalid media value (0x00) 03:20:01 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 880.182184][T20690] FAT-fs (loop2): bogus number of directory entries (516) [ 880.198172][T20685] FAT-fs (loop5): Can't find a valid FAT filesystem [ 880.213417][T20690] FAT-fs (loop2): Can't find a valid FAT filesystem 03:20:02 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:02 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7", 0x15}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:02 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002050270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') ioctl$KVM_GET_MP_STATE(r0, 0x8004ae98, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[], 0xfffffea2}, 0xfffffffffffffffe) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') getitimer(0x0, &(0x7f0000000300)) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="64010000", @ANYRES16=r1, @ANYBLOB="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"], 0x164}, 0x1, 0x0, 0x0, 0x48000}, 0x20008084) r2 = semget$private(0x0, 0x1, 0x280) semctl$SEM_INFO(r2, 0x7, 0x13, &(0x7f0000000340)=""/35) 03:20:02 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) r2 = syz_open_dev$loop(0x0, 0x2, 0x0) r3 = getpgid(0x0) r4 = perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x2) syz_open_procfs(r3, &(0x7f0000000480)='timers\x00') dup2(r2, r2) r5 = syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x8) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r6, 0x2, &(0x7f0000000140)=[r7, r6, r4], 0x3) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r8) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xb5, 0x121801) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r0, 0x10, &(0x7f0000000080)={&(0x7f0000000040)=""/51, 0x33, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100)=r1, 0x4) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) [ 880.888889][T20729] FAT-fs (loop5): invalid media value (0x00) [ 880.934763][T20729] FAT-fs (loop5): Can't find a valid FAT filesystem 03:20:02 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, r2, r1], 0x3) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 881.109309][T20735] FAT-fs (loop2): bogus number of directory entries (517) [ 881.117143][T20735] FAT-fs (loop2): Can't find a valid FAT filesystem 03:20:02 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7", 0x15}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg$inet_sctp(r0, &(0x7f0000000700)={&(0x7f0000000140)=@in={0x2, 0x4e21, @local}, 0x10, &(0x7f0000000640)=[{&(0x7f0000000180)="edb53c8ee53d8b5c91a76de78ef0c59bb2b618cc09ae6a3a7dc3afa85040f8880d88d283920d3db188a63a44c4f737339f685568ed9f7441690b476d730b0bf3fd30c937c6223cbf3f2a33f80f7930739cdc47a4e9e7224b6da0e6e15c704562c3e8b20cee8316587e841d4ed76a20ea1f91dda2e5534c2ddc14d5b7dfa06b1805632f8f45de99e05c0624a8f3bbde2e3e55d5676f7550e29ce20b906b6da102a568c782bde091e70019f511a172bbf4df25ad7a996cc97c8f38530278cec99c6294008f5c1cfdc3e1b7a54e3adb3559006729", 0xd3}, {&(0x7f00000002c0)="778d4455648f573895c4c7df464f25ff1f07acedd7e727c176c9e397cff85f86fa7cb80e11228dc70f601cb430394c0321b70e6590013520142c311a4f0b1cad5abfb03a030e32f0bfde45fc6e9b88f06aae7aa46e2dda589ebcf2157b30746eb30aac446e578b2bd0048cbbd96a4758f301711cd193785b4bc0c1d12e35cc65e2c25b2e5cfe983dcbde6e91fa", 0x8d}, {&(0x7f0000000380)="ba5f0526cdb4036ffa0cd3d599c77ac499940b8f0bffbf60847c8cc0d3bc5d5ca1f15cbf18b0db1d1a8ceffa84b77c6562313cb227b23e45c6aefe496e8c19a7b792519d56643ad44892d014e7493bca924b63cfc59cdd8ebbbb87c5c82ba110b12a4a927876a347ce3fa5baec7aab81c3f3db54d1e063713792e6298a0d868ccd18823e4748be68367d5361e25c79b775c5f01adc3ad2e4c536a2", 0x9b}, {&(0x7f0000000440)="47117fa64173985b4fb40578da2c31c7cc07e23029c04681aa69dc3bb220e40b48ff253863c8dc3bed2409", 0x2b}, {&(0x7f0000000480)="bd3d", 0x2}, {&(0x7f00000004c0)="6455f993adca62d3647a1b6289324c1a3808996c", 0x14}, {&(0x7f0000000500)="e0940888840ae5f1779cb3da35e356b82e3976fe5f137258c27369c816eaef5ed87e94865e03819cd53823b4ce1df4fbf70895a6592cd5b87622", 0x3a}, {&(0x7f0000000540)="cff6f69324e4e128c05cd29e0bfca42d8bbce61018bcb8324ad9b924a15b70aa362c6eb8628b45ed57733bf22433387eb3d480360c7b8220d5cd522311cf811e9d07fe78db4d6468ad7eee3e8e3f1f4a57160f60d3a2d54a315845611ff9fffdc49b41a075e7bc91f983d66f69fb8ecfb2b65f6bdbe51ae49f3d0b9f76dfe62b7eac8ed8a45b50c78e97108d0fde9476102a1951680ddbbb8ee3cacac4e8ce0f805cdfc2dda2dc54e599c08c6a8dc758347483e8d1be7f52e23cb7f6c1522de0bb6f412bb6fb4a14c10f2cc9d3471abbfa582f", 0xd3}], 0x8, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000020000000084000000050000001000000006000000"], 0x18, 0x4081}, 0x40000c0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000007c0)={0x8, 0x0, 0x2, 0xb443}) ioctl$DRM_IOCTL_AGP_UNBIND(r0, 0x40106437, &(0x7f0000000800)={r1, 0x80000001}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000740)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000780)={r2, 0x80000, r0}) ioctl$RTC_PIE_ON(r0, 0x7005) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000000)={{{@in6, @in=@initdev}}, {{@in6=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) 03:20:03 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:03 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002060270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 881.633889][T20763] FAT-fs (loop5): invalid media value (0x00) 03:20:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[]}, 0xfffffffffffffffc) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 03:20:03 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, r2, r1], 0x3) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) r2 = syz_open_dev$loop(0x0, 0x2, 0x0) r3 = getpgid(0x0) r4 = perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x2) syz_open_procfs(r3, &(0x7f0000000480)='timers\x00') dup2(r2, r2) r5 = syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r6, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r6, 0x2, &(0x7f0000000140)=[r7, r6, r4], 0x3) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r8) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 881.715103][T20763] FAT-fs (loop5): Can't find a valid FAT filesystem 03:20:03 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7", 0x15}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:03 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 882.045407][T20788] FAT-fs (loop2): bogus number of directory entries (518) [ 882.070306][T20788] FAT-fs (loop2): Can't find a valid FAT filesystem 03:20:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) ioctl$sock_netdev_private(r0, 0x89fe, &(0x7f0000000080)="82090c6749606a247b689e493bd8a2570a1a58f858f622f955670fa7bda619b9ae72f29472a9062ce9db7167d90fa8d50f169caa003b32a0dbcc9ab17ce6db2e67b3a03477cd03ef755bd38fd20a46df760bae5ea876297a008ed8f137d24648c586d4e0a6978038d1527ae6057b3b89a8c46ce48e76203840b9d50851a14a703fac0b49f73205809a081ab5c1cbbdd33bbd9adb5b03a864c8316290ec86ea5db18e5e1541") bind(r0, &(0x7f0000000000)=@caif=@rfm={0x25, 0x0, "8cc696bb769ed121b23b0961f09ebe56"}, 0x80) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 03:20:03 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:03 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, r2, r1], 0x3) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:03 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002070270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x3ff}, 0x4) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000040)={0x7, {0x6, 0x5, 0x7f, 0x2}, {0x6, 0x400, 0x81, 0x1ff}, {0x3, 0x100000000}}) [ 882.548459][T20812] FAT-fs (loop5): invalid media value (0x00) [ 882.585771][T20812] FAT-fs (loop5): Can't find a valid FAT filesystem 03:20:04 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) fchdir(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:04 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x80000, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f00000000c0)) r1 = getpid() r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaaaabb0000000000000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c000000000000000000000000000000000000002000000008000000000000000000fbffffff00004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b0000000000827900000000000000000000000000000800"/560]}, 0x2a8) r3 = syz_open_procfs(r1, &(0x7f0000000040)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) ioctl$UI_SET_ABSBIT(r3, 0x40045567, 0x7) preadv(r3, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/201}, {&(0x7f0000000100)}, {&(0x7f0000000140)=""/115}, {&(0x7f0000000340)=""/106}], 0x100000000000009e, 0x400000000000) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r3, 0x800455d1, &(0x7f0000000000)) 03:20:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) r2 = syz_open_dev$loop(0x0, 0x2, 0x0) r3 = getpgid(0x0) r4 = perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x2) syz_open_procfs(r3, &(0x7f0000000480)='timers\x00') dup2(r2, r2) r5 = syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r6, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r6, 0x2, &(0x7f0000000140)=[r7, r6, r4], 0x3) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r8) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:04 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 882.937255][T20832] FAT-fs (loop2): bogus number of directory entries (519) 03:20:04 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) fchdir(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 882.979238][T20832] FAT-fs (loop2): Can't find a valid FAT filesystem 03:20:04 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='sched\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 03:20:04 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002080270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:05 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) fchdir(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:05 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:05 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f0000000000), 0x10000000000001e8, 0x0) [ 883.559151][T20884] FAT-fs (loop2): bogus number of directory entries (520) 03:20:05 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 883.613487][T20884] FAT-fs (loop2): Can't find a valid FAT filesystem 03:20:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) r2 = syz_open_dev$loop(0x0, 0x2, 0x0) r3 = getpgid(0x0) r4 = perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x2) syz_open_procfs(r3, &(0x7f0000000480)='timers\x00') dup2(r2, r2) r5 = syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(r6, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r6, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, r6, r4], 0x3) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r7) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:05 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e6661740002040100020a0270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:05 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bcsf0\x00', 0x0}) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000080)={r0, 0x1, 0x1000000000000}) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f00000002c0)={r1, 0x3, 0x81, 0x80000000, 0x8000, 0x60000000, 0x6}) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) connect$can_bcm(r0, &(0x7f0000000040), 0x10) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x20, 0x0, 0x7b, 0x1f, 0x8}) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 03:20:05 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:05 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:05 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x146, 0x3) [ 884.354404][T20927] FAT-fs (loop2): bogus number of directory entries (522) 03:20:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) r2 = syz_open_dev$loop(0x0, 0x2, 0x0) r3 = getpgid(0x0) r4 = perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x2) syz_open_procfs(r3, &(0x7f0000000480)='timers\x00') dup2(r2, r2) r5 = syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(r6, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r6, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, r6, r4], 0x3) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r7) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 884.396135][T20927] FAT-fs (loop2): Can't find a valid FAT filesystem 03:20:06 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002100270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:06 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:06 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:06 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x70, 0x1, 0x9, 0x1, 0x80fc, 0x0, 0x8, 0x8, 0x4, 0xffffffffffffad83, 0x6, 0x9, 0x8e, 0x5, 0x1, 0x0, 0x4, 0x400, 0x4, 0x38a0000000000, 0x5, 0xfff, 0x8, 0xe56, 0x7ef8, 0x5cb9, 0x8, 0x8, 0x800, 0x6, 0x7, 0x7, 0x2, 0x4, 0x7fff, 0xfffffffffffffbff, 0x7, 0x0, 0x3ff, 0x0, @perf_config_ext={0xad6, 0x5}, 0x80, 0xa62f, 0x2c2, 0x7, 0x0, 0x6, 0x4}, r0, 0xffffffffffffffff, r0, 0xe) 03:20:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) r2 = syz_open_dev$loop(0x0, 0x2, 0x0) r3 = getpgid(0x0) r4 = perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x2) syz_open_procfs(r3, &(0x7f0000000480)='timers\x00') dup2(r2, r2) r5 = syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) ioctl$TIOCGPTLCK(r6, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r6, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, r6, r4], 0x3) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r7) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:06 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:06 executing program 1: userfaultfd(0x800) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000104, 0x400000000000) 03:20:06 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:07 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000370f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:07 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:07 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000000)={0xe, 0x7, 0x80000000, 0x7fffffff, 0xb0, "a6b0c27054f7fb40da1dc60afd9a1b8a9cbf1e99e9a54737de46227f89e3559f63727d127aea45f4ffde88a6c3e3a135d6d4442ac44bcfbc37c7ac1e0130bc017c568aaf1bc336621f942574a2fba4343fab68fa4d67d07abb6a8a751661ac7d7bf02d5df12e815e7fdd7482fed51d3df8d1e88df54dad6eab228f09e23fd698cdb3cef6e75921ef0e8f524f5d5f4dc036850b7ffddd4db618a4a1a04d3b682e80a6b8b09c942c86e00a88940c68e2f0"}, 0xbc) 03:20:07 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(0x0, &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:07 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:07 executing program 1: r0 = getpgid(0x0) r1 = syz_open_procfs(r0, &(0x7f0000000280)='net/arp\x00') openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) acct(&(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080), &(0x7f00000000c0)=0x4) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x400000000000) 03:20:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) r2 = syz_open_dev$loop(0x0, 0x2, 0x0) r3 = getpgid(0x0) r4 = perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x2) syz_open_procfs(r3, &(0x7f0000000480)='timers\x00') dup2(r2, r2) r5 = syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) ioctl$TIOCGPTLCK(r6, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r6, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, r6, r4], 0x3) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r7) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:07 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:07 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:07 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r0, 0x800455d1, &(0x7f0000000740)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) ioctl$KVM_SMI(r0, 0xaeb7) recvmsg(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000000)=""/34, 0x22}, {&(0x7f0000000040)=""/65, 0x41}, {&(0x7f00000000c0)=""/180, 0xb4}, {&(0x7f0000000180)=""/66, 0x42}, {&(0x7f00000002c0)=""/224, 0xe0}, {&(0x7f00000003c0)=""/213, 0xd5}, {&(0x7f00000004c0)=""/174, 0xae}, {&(0x7f0000000580)=""/130, 0x82}, {&(0x7f0000000200)=""/27, 0x1b}], 0x9, &(0x7f0000000240)=""/62, 0x3e}, 0x20) 03:20:08 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(0x0, &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:08 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000570f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:08 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[]}, 0x2) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 03:20:08 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) r2 = syz_open_dev$loop(0x0, 0x2, 0x0) r3 = getpgid(0x0) r4 = perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x2) syz_open_procfs(r3, &(0x7f0000000480)='timers\x00') dup2(r2, r2) r5 = syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) ioctl$TIOCGPTLCK(r6, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r6, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, r6, r4], 0x3) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r7) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:08 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(0x0, &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:08 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:08 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') mq_notify(r0, &(0x7f00000000c0)={0x0, 0x25, 0x1, @thr={&(0x7f00000002c0)="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", &(0x7f0000000000)="c0f1e8b7496f4a2d4fcbe694291da33fbcfbf9eb6c206db54d8b1c6ed660fe4b00355afd05b64d597f06e9b6673846b5ca98868993d16272fb06b83ee0f4491f8cf0c87187810298f439a61aa61d697a52efecd90f989b9899faa1ea21605241e86af231a76a64d69272b63c7c9d9776732135cbfbd70f49e493f67612d5799467"}}) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000100)=0x60, 0x2) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 03:20:08 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:08 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x3f, "5c2508abb2f0495c95fe28f0d663a86e96efe1a934b70a745d2098d79359da888ac892748cbe4154fabb3338e295e058dc5b3ac831f834ae0cd502101927f8"}, &(0x7f0000000080)=0x47) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={r1, @in6={{0xa, 0x4e23, 0x3, @local, 0x7}}, 0x5, 0x2, 0x800000000, 0xfffffffffffffffc, 0x14}, 0x98) preadv(r0, &(0x7f0000000000), 0x0, 0x0) 03:20:09 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', 0x0, 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:09 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:09 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000670f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:09 executing program 1: lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 03:20:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) r2 = syz_open_dev$loop(0x0, 0x2, 0x0) r3 = getpgid(0x0) r4 = perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x2) syz_open_procfs(r3, &(0x7f0000000480)='timers\x00') dup2(r2, r2) r5 = syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(r6, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r6, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, r6, r4], 0x3) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r7) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:09 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', 0x0, 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:09 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:09 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYPTR=&(0x7f0000000040)=ANY=[], @ANYRES16=0x0, @ANYRES32=r0, @ANYBLOB="34d1ff8cde4449fd4dae74c4043d7935b6c0688aac839043f1ec4b94c26d3e01f824801e473cf5c74ec34a842da7e902314744f1f0ca34bedd3c8e595796318bdbc2846789a34860c3cfe601555d2e6bbefb9bce950e51dede31424b95972c", @ANYRESHEX=r0], 0x7e}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) gettid() 03:20:09 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:09 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', 0x0, 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:09 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffd8e, &(0x7f0000000480)=ANY=[], 0xffffffffffffff69}, 0x10004008080) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 03:20:09 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x0, &(0x7f00000001c0)}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:10 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x0, 0x400000000000) 03:20:10 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000770f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:10 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, r1], 0x2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:10 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) r2 = syz_open_dev$loop(0x0, 0x2, 0x0) r3 = getpgid(0x0) r4 = perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x2) syz_open_procfs(r3, &(0x7f0000000480)='timers\x00') dup2(r2, r2) syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, r4], 0x3) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:10 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000040}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="98000000", @ANYRES16=r1, @ANYBLOB="04002bbd7000fcdbdf25110000001c0002000800020002000000080001000000010008000200060000001c0002000400040008000200233dffff0400040008000100000000002c0007000c000400f7ffffffffffffff08000200010000000c0004001f000000000000000800210003000000200007000c000400400000000000000008000100010000000800020000800000"], 0x98}, 0x1, 0x0, 0x0, 0x4040000}, 0x10) 03:20:10 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, r1], 0x2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:10 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x0, &(0x7f00000001c0)}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 889.188357][T21222] FAT-fs (loop0): bogus number of reserved sectors 03:20:10 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000000)={0x2, 0x8d, "5e873f10640522614ba65b41142bfce3e71f6d57e3856c647cd9e883bea69e55ea74bc19c225f8d4539c8958befbc63da33a11a1ea9063071beff5a8ab92698b22c873623b29ab3ffc0fb9064643c6b5920e50bfd011f255a7aac15b580b7aac2915fd08552b51be9cbbef9f7d60377a009a65b5be5f953644525d3f001bcf7bafa08e111da8d626963e707533"}) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@gettaction={0x14, 0x32, 0x300, 0x70bd29, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4008000}, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) mmap$binder(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x1, 0x11, r0, 0x1f) ioctl$CAPI_GET_MANUFACTURER(r0, 0xc0044306, &(0x7f00000001c0)=0x1) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) [ 889.248876][T21222] FAT-fs (loop0): Can't find a valid FAT filesystem [ 889.275522][T21211] FAT-fs (loop2): Directory bread(block 112) failed 03:20:11 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, r1], 0x2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) r2 = syz_open_dev$loop(0x0, 0x2, 0x0) r3 = getpgid(0x0) r4 = perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x2) syz_open_procfs(r3, &(0x7f0000000480)='timers\x00') dup2(r2, r2) syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, r4], 0x3) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:11 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:11 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x0, &(0x7f00000001c0)}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:11 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000a70f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:11 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x218) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 03:20:11 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:11 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000000c0)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000040)='attr/prev\x00') openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x20000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x400000000000) [ 889.900047][T21266] FAT-fs (loop0): bogus number of reserved sectors [ 889.929578][T21266] FAT-fs (loop0): Can't find a valid FAT filesystem 03:20:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) r2 = syz_open_dev$loop(0x0, 0x2, 0x0) r3 = getpgid(0x0) r4 = perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x2) syz_open_procfs(r3, &(0x7f0000000480)='timers\x00') dup2(r2, r2) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, r4], 0x3) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:11 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:11 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x31, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:12 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)=0x0) read(r0, &(0x7f0000000080), 0x0) syz_open_procfs(r1, &(0x7f0000000040)='smaps_rollup\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) [ 890.463844][T21278] FAT-fs (loop2): Directory bread(block 112) failed [ 890.520497][T21278] FAT-fs (loop2): Directory bread(block 113) failed [ 890.579402][T21278] FAT-fs (loop2): Directory bread(block 114) failed [ 890.599749][T21278] FAT-fs (loop2): Directory bread(block 115) failed [ 890.607193][T21278] FAT-fs (loop2): Directory bread(block 116) failed [ 890.615237][T21278] FAT-fs (loop2): Directory bread(block 117) failed [ 890.664780][T21306] FAT-fs (loop0): bogus number of reserved sectors 03:20:12 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xcb, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) dup2(r0, r1) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_256={{0x304}, "502b9fdf57dcfe21", "4efcf0cd78ac0fd9d43071201668cd682130965022e378a8a5a7f1e9e3f733bb", "cb5d5d48", "03c24f2867ca3439"}, 0x38) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff5d, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x400000000000) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x5, 0x400000) ioctl$PPPIOCGDEBUG(r2, 0x80047441, &(0x7f0000000040)) 03:20:12 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x31, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 890.710905][T21278] FAT-fs (loop2): Directory bread(block 118) failed [ 890.724881][T21306] FAT-fs (loop0): Can't find a valid FAT filesystem [ 890.777230][T21278] FAT-fs (loop2): Directory bread(block 119) failed 03:20:12 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 890.866629][T21278] FAT-fs (loop2): Directory bread(block 120) failed [ 890.926213][T21278] FAT-fs (loop2): Directory bread(block 121) failed [ 890.943937][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:20:12 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002001470f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:12 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) r2 = syz_open_dev$loop(0x0, 0x2, 0x0) r3 = getpgid(0x0) r4 = perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x2) syz_open_procfs(r3, &(0x7f0000000480)='timers\x00') dup2(r2, r2) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, r4], 0x3) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:12 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x31, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(r0, &(0x7f0000000080)={0x0, 0xff2f, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r0], 0xfffffffffffffe8a}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 03:20:13 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 891.499053][T21363] FAT-fs (loop0): bogus number of reserved sectors [ 891.550212][T21363] FAT-fs (loop0): Can't find a valid FAT filesystem 03:20:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) r2 = syz_open_dev$loop(0x0, 0x2, 0x0) r3 = getpgid(0x0) r4 = perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x2) syz_open_procfs(r3, &(0x7f0000000480)='timers\x00') dup2(r2, r2) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, r4], 0x3) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:13 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[]}, 0x200) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f0000000200)={0x0, 0x51, 0xffffffffffffff00, 0xca, &(0x7f0000000000)=""/202, 0xe4, &(0x7f0000000100)=""/228, 0x91, &(0x7f00000002c0)=""/145}) preadv(r0, &(0x7f0000000200), 0x178, 0x1) 03:20:13 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x4a, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a062075"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:13 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[r1, 0xffffffffffffffff], 0x2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 891.966740][T21376] FAT-fs (loop2): Directory bread(block 112) failed [ 892.071190][T21376] FAT-fs (loop2): Directory bread(block 113) failed [ 892.078387][T21376] FAT-fs (loop2): Directory bread(block 114) failed [ 892.113664][T21376] FAT-fs (loop2): Directory bread(block 115) failed [ 892.142745][T21376] FAT-fs (loop2): Directory bread(block 116) failed 03:20:13 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfffffffffffffff9, 0x240401) recvfrom(r0, &(0x7f0000000040)=""/157, 0x9d, 0x1, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x400000000000) mknod(&(0x7f0000000100)='./file0\x00', 0xc204, 0x1) [ 892.200485][T21376] FAT-fs (loop2): Directory bread(block 117) failed [ 892.240722][T21404] FAT-fs (loop0): bogus number of reserved sectors [ 892.285286][T21404] FAT-fs (loop0): Can't find a valid FAT filesystem [ 892.332226][T21376] FAT-fs (loop2): Directory bread(block 118) failed [ 892.416491][T21376] FAT-fs (loop2): Directory bread(block 119) failed [ 892.520586][T21376] FAT-fs (loop2): Directory bread(block 120) failed [ 892.538941][T21376] FAT-fs (loop2): Directory bread(block 121) failed 03:20:14 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002001e70f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:14 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x4a, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a062075"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:14 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[r1, 0xffffffffffffffff], 0x2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:14 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x2, 0x0) listen(r0, 0x6) ioctl$TCSETX(r0, 0x5433, &(0x7f0000000480)={0x9, 0x8, [0x1ff, 0x7, 0x5, 0xfe00000000000000, 0x73], 0x10000}) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='net/sockstat6\x00') r2 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000340)='neat6\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xae>\xb9\x00P<\xd6\xbb\x9c\xc8\xb8\xfa&\xcfy\xb0\x03-\x1a\xe9,\x1a\x80\xbf\xc1\x8a\xab\v\xf6\xe6\xc2\xc4\xfa\xf5\r\xac&\xe7\x7fk>]\xc1\x19\t\b\x00\x00\x00\x00\x00\x00\x00\x8a;/\xed\xbc\xb8\x98\\?\xbe[\x8f\xbcxH;\tw\xdf\xaa\xda\x18\xd2\xfb\xd3j\x88\xdb\xe7\xa6aHsW\xbd\x88\x88\xfahz2\xac+\x8aH\xda\xc4G#J~\xa5\x18a\xf5\xac\xcc~\xcc\xe4=\x9e\xe9v\xf40\x8f\v9W\xc9\xee\xd4[]\xa9\xf2\xddV\xf5\\\xe5\x84\x9b\xeb\xf6$(r5\xf6\xe4\x10\xbd\x03K\xa2\xd7y\xfedD\xa2\nisQ\xd2Y\xaa\xa8RG\x99\xc0Xa<]\x87\xea\xed\xe6e\vx2F\xcb\xca\xc4\xd4e\xb66\xfeb\x92!\xf2\fo\xd1\xc8\x80\n') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000440)=0x7, 0x1) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x72f, 0xffff, "30b2ba8bd2f79a857d7c500b2773244a9619fdc110666ffbe8a8a138ca4298b1cc4dd03d4a3c72ae95ba3c2b8af3e5d82fd7520f833b3014912e087b787151ded3a0569660225898d9287879e36bd37e9cf88fc22ddc3a625ff18c992b3506c0068a32a1777ac03d810eb706946a42e70eaf87fdb8b388b54135567d3ece4d7b39cba506d73f956927ac40fb8fce038a53207ea4715c6082198f338ba147554b554ef69eb1a30aaa66f42e8a68b653a9b065588e15ab32d15f4ac527c1328c7e1da3c893c86a964aa660e46a7c5a8e72ea21e622b09d3171f17424326983d1420a35f6096dfb198f12456fbe5e9f45b9c4c31caca213463f4e5def6a6fd83d22", 0xdc, 0x6, 0x20, 0x1, 0x401, 0x401, 0x400}, r3}}, 0x128) ioctl$VIDIOC_ENUMAUDOUT(r1, 0xc0345642, &(0x7f0000000000)={0xce, "3e3bfe2c56089e152b82a92eb39993fe3bbcafd1ebab53d3eb29ba657df88bd0", 0x3, 0x1}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000280)) 03:20:14 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) syz_open_dev$loop(0x0, 0x2, 0x0) r2 = getpgid(0x0) r3 = perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x2) syz_open_procfs(r2, &(0x7f0000000480)='timers\x00') syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, r3], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:14 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/\x01\x00\x00\x00\x00\x00\x00\x006\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4020200}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)={0x114, r1, 0xb01, 0x70bd26, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x65}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x2}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x6}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100000001}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4d}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x16}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x200}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}]}, @IPVS_CMD_ATTR_DAEMON={0x68, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x40}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6tnl0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_1\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}]}, 0x114}, 0x1, 0x0, 0x0, 0x840}, 0xc000) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000080)=0x4) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000340), &(0x7f0000000380)=0x4) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), &(0x7f00000000c0)=0xfffffffffffffe4f) 03:20:14 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[r1, 0xffffffffffffffff], 0x2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 892.959091][T21445] FAT-fs (loop0): bogus number of reserved sectors 03:20:14 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x4a, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a062075"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 893.012782][T21445] FAT-fs (loop0): Can't find a valid FAT filesystem 03:20:14 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0xffffffffffffffea, &(0x7f0000000480)=ANY=[], 0x24ad7dea}, 0x0) preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000000)=""/56}, {&(0x7f0000000040)=""/139}, {&(0x7f0000000100)=""/48}, {&(0x7f0000000140)=""/16}, {&(0x7f0000000180)=""/254}, {&(0x7f00000002c0)=""/53}, {&(0x7f0000000300)=""/140}, {&(0x7f00000003c0)=""/43}, {&(0x7f0000000400)=""/77}], 0xe7, 0x400000000000) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000005c0)={0x0, 0xc4, "ca4130ad2c2d014adc02c060096024f7ef195af6a946b488f0bd32e09492c17adb54482fbb415cac7602ae86cb23f75616b3246a7acc2fdb04479bb867923caffcb37a14fd5c67ba66b06b72277eb59321934bde0bcd244d3f0663669e1878465f928f235ba5790c91b3fe8e36dee3700007f7c01046364a689a0a9c8dc16bee3d2c9365e0b476794d329770f34950e238bb77dff8158ab9a4aafb87a3277d03885b68b342585d95529cd91a4e2f579ca035ba371d738cbe4226cd58e9965f7b94e38412"}, &(0x7f00000006c0)=0xcc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000700)={r1, 0x200}, &(0x7f0000000740)=0x8) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000540), &(0x7f0000000580)=0x8) 03:20:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) syz_open_dev$loop(0x0, 0x2, 0x0) r2 = getpgid(0x0) r3 = perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x2) syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, r3], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:15 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x0, &(0x7f0000000040), 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 893.657632][T21456] FAT-fs (loop2): Directory bread(block 112) failed [ 893.701329][T21488] FAT-fs (loop0): bogus number of reserved sectors [ 893.708068][T21456] FAT-fs (loop2): Directory bread(block 113) failed [ 893.708097][T21456] FAT-fs (loop2): Directory bread(block 114) failed [ 893.708125][T21456] FAT-fs (loop2): Directory bread(block 115) failed [ 893.708151][T21456] FAT-fs (loop2): Directory bread(block 116) failed [ 893.708179][T21456] FAT-fs (loop2): Directory bread(block 117) failed [ 893.708205][T21456] FAT-fs (loop2): Directory bread(block 118) failed [ 893.708233][T21456] FAT-fs (loop2): Directory bread(block 119) failed [ 893.709569][T21456] FAT-fs (loop2): Directory bread(block 120) failed [ 893.732384][T21456] FAT-fs (loop2): Directory bread(block 121) failed [ 893.756551][T21488] FAT-fs (loop0): Can't find a valid FAT filesystem 03:20:15 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002004070f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:15 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x56, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:15 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) write$P9_RUNLINKAT(r0, &(0x7f00000003c0)={0x7, 0x4d, 0x2}, 0x7) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000080)=""/185, 0xb9}, {&(0x7f0000000140)=""/233, 0xe9}, {&(0x7f0000000240)=""/32, 0x20}, {&(0x7f00000002c0)=""/226, 0xfffffec6}, {&(0x7f00000004c0)=""/61, 0x3d}, {&(0x7f0000000500)=""/28, 0x1c}], 0x1000000000000349, 0x400000000000) mq_timedsend(r0, &(0x7f0000000000)="8e516ee67862077dc60c53bdc3afccce5de3aea75c9dd7d615be67142f3dc3cbf416d2908b427c5da7", 0x29, 0x7fff, &(0x7f0000000040)={0x0, 0x1c9c380}) 03:20:15 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) getpgid(0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000140)=[r1, r0], 0x2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:15 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x0, &(0x7f0000000040), 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:15 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f0000000a40)=[{&(0x7f00000002c0)=""/207, 0xcf}, {&(0x7f00000003c0)=""/208, 0xd0}, {&(0x7f00000004c0)=""/158, 0x9e}, {&(0x7f0000000580)=""/63, 0x3f}, {&(0x7f00000005c0)=""/233, 0xe9}, {&(0x7f00000006c0)=""/243, 0xf3}, {&(0x7f0000000b00)}, {&(0x7f0000000800)=""/227, 0xe3}, {&(0x7f0000000900)=""/48, 0x30}, {&(0x7f0000000940)=""/195, 0xc3}], 0xa, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000000)=0xdf) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000040)=@int=0x7, 0x4) r1 = getpgrp(0x0) getpriority(0x0, r1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @rand_addr=0x7fffffff}}, 0x4, 0x81}, &(0x7f0000000200)=0x90) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000240)={0x843, 0x8000, 0x1, 0xff, r2}, 0x10) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x1, 0x7, [0x100000001, 0x1f, 0x20, 0x900f, 0x9c5, 0x0, 0xad8e]}, &(0x7f00000000c0)=0x16) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000100)={r3, 0x1, 0x8, 0x100000001, 0x9, 0x8001}, 0x14) 03:20:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) syz_open_dev$loop(0x0, 0x2, 0x0) r2 = getpgid(0x0) r3 = perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x2) syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, r3], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:15 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) getpgid(0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000140)=[r1, r0], 0x2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:15 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x56, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 894.279291][T21511] FAT-fs (loop0): bogus number of reserved sectors [ 894.338872][T21511] FAT-fs (loop0): Can't find a valid FAT filesystem 03:20:16 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0xfffffffffffffe2c, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000100), &(0x7f00000000c0)=0xffffffffffffff9d) 03:20:16 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x0, &(0x7f0000000040), 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:16 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) getpgid(0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000140)=[r1, r0], 0x2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 894.750665][T21524] FAT-fs (loop2): Directory bread(block 112) failed [ 894.769072][T21524] FAT-fs (loop2): Directory bread(block 113) failed [ 894.796748][T21524] FAT-fs (loop2): Directory bread(block 114) failed [ 894.859547][T21524] FAT-fs (loop2): Directory bread(block 115) failed [ 894.911342][T21524] FAT-fs (loop2): Directory bread(block 116) failed [ 894.939243][T21524] FAT-fs (loop2): Directory bread(block 117) failed [ 894.999402][T21558] FAT-fs (loop0): bogus number of reserved sectors [ 895.025230][T21558] FAT-fs (loop0): Can't find a valid FAT filesystem [ 895.042614][T21524] FAT-fs (loop2): Directory bread(block 118) failed [ 895.085409][T21524] FAT-fs (loop2): Directory bread(block 119) failed [ 895.136637][T21524] FAT-fs (loop2): Directory bread(block 120) failed [ 895.144138][T21524] FAT-fs (loop2): Directory bread(block 121) failed 03:20:16 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200ff70f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:16 executing program 1: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) accept4$packet(r1, &(0x7f0000000040), &(0x7f0000000080)=0x14, 0x800) timer_create(0x7, &(0x7f0000000200)={0x0, 0x15, 0xa026049f85a4e6f4, @thr={&(0x7f0000000100)="40b3652c9901b9791ae35f1042f32d145d05754accce3b24fbfe9f4fde2d8084b6cc68a8d60f08e8ec14041e01d415e144c0d0b7997e0e532cb453be4a", &(0x7f0000000140)="cf21640faa7b5d4041a839318ae969e6c4a80471dca546d251fe95cc1925bae33feb60b40af8e67909127de57896649cf682a0882814e32d649af842b6332ba50a948c6e4a7b6d56bf10cdae02708509bf53483de648f5f358c4c67109e0f29947b3f1860e2a4fc486d96c812bc3dc0c025cabef0f2be5d4b8e402ce41d8fadef1190da238258baa3a08535d96809e60b56b66fa6e19b2e7bae028aadf81ba52897ad119fbd87d5159eba385"}}, &(0x7f0000000240)=0x0) timer_delete(r2) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f00000002c0)={'IDLETIMER\x00'}, &(0x7f0000000300)=0x1e) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x400000000000) getsockopt$inet_mreqsrc(r1, 0x0, 0x2f, &(0x7f0000000340)={@rand_addr, @remote, @initdev}, &(0x7f0000000380)=0xc) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f00000000c0)) 03:20:16 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x56, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:16 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000140)=[r1, r0], 0x2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) syz_open_dev$loop(0x0, 0x2, 0x0) r2 = getpgid(0x0) r3 = perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, r3], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:16 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{0x0}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000000)=0x3) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000040)=0x10000) [ 895.601260][T21589] FAT-fs (loop0): bogus number of reserved sectors 03:20:17 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x5c, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:17 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000140)=[r1, r0], 0x2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 895.648125][T21589] FAT-fs (loop0): Can't find a valid FAT filesystem 03:20:17 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{0x0}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) syz_open_dev$loop(0x0, 0x2, 0x0) r2 = getpgid(0x0) r3 = perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, r3], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f0000000100)=[{}, {&(0x7f00000002c0)=""/4096}, {&(0x7f0000000040)=""/6}, {&(0x7f0000000080)=""/13}, {&(0x7f0000000180)=""/6}], 0x4b, 0x4400100000802) [ 896.285129][T21627] FAT-fs (loop0): bogus number of reserved sectors [ 896.339164][T21627] FAT-fs (loop0): Can't find a valid FAT filesystem [ 896.424153][T21599] FAT-fs (loop2): Directory bread(block 112) failed [ 896.471171][T21599] FAT-fs (loop2): Directory bread(block 113) failed [ 896.488845][T21599] FAT-fs (loop2): Directory bread(block 114) failed [ 896.495753][T21599] FAT-fs (loop2): Directory bread(block 115) failed [ 896.513944][T21599] FAT-fs (loop2): Directory bread(block 116) failed [ 896.521708][T21599] FAT-fs (loop2): Directory bread(block 117) failed [ 896.534413][T21599] FAT-fs (loop2): Directory bread(block 118) failed [ 896.572158][T21599] FAT-fs (loop2): Directory bread(block 119) failed [ 896.583777][T21599] FAT-fs (loop2): Directory bread(block 120) failed [ 896.591779][T21599] FAT-fs (loop2): Directory bread(block 121) failed 03:20:18 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000370f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:18 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="000775b005e381e5b3b60ced5c54dbb7", 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000004c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=""/86, 0x56}}], 0x1, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80), 0x33f, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 03:20:18 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000140)=[r1, r0], 0x2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:18 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x5c, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) syz_open_dev$loop(0x0, 0x2, 0x0) getpgid(0x0) syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:18 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{0x0}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:18 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) inotify_init1(0x80800) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 03:20:18 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x5c, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:18 executing program 3: r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 897.025098][T21661] FAT-fs (loop0): bogus number of reserved sectors [ 897.039059][T21661] FAT-fs (loop0): Can't find a valid FAT filesystem 03:20:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) syz_open_dev$loop(0x0, 0x2, 0x0) getpgid(0x0) syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:19 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:19 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000000c0)=0x2c) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[]}, 0x0) sendmmsg$sock(r1, &(0x7f0000000ec0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000100)="7eefc923464bb33a9458841ef73e5bdb87b2db282ab1bfdd9f41acc42b3b058c04a58460d5827517d3e8f7a0d7add9ca2e15d7d5d302695c4363ff0734d79b7b52d426ee79f91f47ee3797faae58a50e7e827de624ff78db3216b5515bbb2a9e71b766214db19d6e4dcef2a9c1ed9989e562ac812b1ecc262a3adc0271f4b7742a2cfade57b94fd6342f990c421c25302ada5fa89d0623666d5162b066172a333d9f142f64fe9c0d06", 0xa9}, {&(0x7f00000001c0)}, {&(0x7f0000000200)="2b0fac00f5614e0401570a89a9095f8cdc86d6ce8bc2cf76164315498b8bb2a13a59b790f19da62c8a63ed30d776aa374c64f174f53e82bd005a32bae5865cc1a45f922d", 0x44}, {&(0x7f00000002c0)="45d3afb01be58e55461ce1537fbc308c96e4d4cc8170b13243f32115536619c8ec3b63a93cb1", 0x26}, {&(0x7f0000000300)="9d92bbdd8133bf3e2e281bae03843c09b38f742a8d1f29cab2fd1cddeaf99c744bd40e08701c86f3ef6b6eb3c48d0d441da716b032f0d6", 0x37}], 0x5, &(0x7f00000003c0)=[@mark={{0x14, 0x1, 0x24, 0x100000001}}], 0x18}}, {{&(0x7f0000000400)=@in6={0xa, 0x4e24, 0x3, @dev={0xfe, 0x80, [], 0x22}, 0x1a}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000480)="efe62102b82d5c5d983dcb07c62717e077c4ebbffacb7ff689ede5bac74e8af33771af07f9c184003b0357baa6009ef463c72bef987a8d81cc01ee4c87596155207c5fc70b8bcd8e0397c6a8f2d1a950569d0fc422fed6aa5685b3511dc876afeb2a57069c15624c0285875615bf2d1feff372e128c6caa1297b78409676a1edb1812134bd7cd21bfef06ae85e83c99ef99c24776a1f0ccd8a256e316d39c2ec935b5de7f3", 0xa5}, {&(0x7f0000000540)="acf4dcdb2a3edb246ff58bcd60628bf7", 0x10}, {&(0x7f0000000580)="bbe6a8cf81fcd5870f59349c4865a210adffa8a64c50c68b6117d3899bb7c30c7139f77ea4103a67db3814aa0e6fe2262b80a70d981bad5bc01ccd9b91f0122cb8522c4a4ccfeb80d40658863d6c445a403cf0007402334a210aed05f7d8ea11f1f53f21362866fb82b9a9242405087062a0eb4e03ce69", 0x77}, {&(0x7f0000000600)="547cae9eadbabedcf3b13b63b0951d985a67270ab2649bceb2782d7c4ab63cca7c7f85022dc4c0864a8bf9278bcda8d1651afcda805f13f9bbcf9916587bbab7032d8c7f40259c8679beca2cf52b9de138b60ecd39277835", 0x58}, {&(0x7f0000000680)="ef098caaddc6db5ef884c7397421533fb43db26d03f6d2ae08e3ddfe230adfef76f6498dbf69dccd5c10e650d168c19925c92846b2e7bf4d9c6f45a4ce1ccf1455ab85a2f4e88ae36447f5906930353c3125920cd2c805cc8fd8d860d753bf6bdf74e3a38dbba7e2ab019e04adb3664cc644c90ac3a109a4457f875746715515ffcd085ebefff5fb89415362b05977f4646da1fde597fa4a158001c223e616c6457f7f18ee", 0xa5}, {&(0x7f0000000740)="98555fedbe78295c1de2c12ac3e4b78b36d39f1086b4acc9d3401716f7fcfb7d6b7319809ad95868149d4d6f6a26d917c2cd358be79d2a03bd124ac774505ba3eabf3a276283ae070bc65f747b3b03698fd7facb9c246e229157e4c4176eb98210bb85afd2964ee5224fd09736ab55dff6be2cb90b1e71a9ddc301d46bdaa0", 0x7f}, {&(0x7f00000007c0)="34fac799bacb19cefde6a321b6df52e467fb10ff88b08d98aa500c7c88e8c814b0dc1b6f0a819576df431fc60389d3ce30531333ce2ed9559dfd2cde9690f2fd0946999a3f52c73d5bd7d622cc54d688ddc94288d8d6415211296d4f981a56bc3b6d0015f352ea87dc62935b475a9d99ef520b57a6c8baefcfb8d16e33b20d21f13bb9a28a2700ad5bb82d997aab62be81e095cb10450a78a2def85f75a79d628bf13dd0017bb553141d6f7e3a68c2c6b355719a4e5a9b5ebe575c6f", 0xbc}], 0x7}}, {{0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000900)="08d45269b9950370997560ab5b22da12b1877d70932ab8c9f7eaa2164a96d7bf4e60d1d326757d1f7e96c334755653614ac4ca30d88b9a14b530570dbb7fb30496179834aa6bd33a86d67aa893cf2eb69732d0239488b5ead0ae361f7780ed75cec9b5a6b8358b88c28b5521f08de5d4e015f98a2121bd0afb25fc0d9a07a4756773836b8bc3a0f3fe8d9e74d0fc2c517989b64911ca1b40b2ef2964bcd8af310421fd9f6a98c4102c9d358a9b61098ad02a48fe702ad14a1d3eaca2922958834093d7ed4dfca181d73bc2", 0xcb}, {&(0x7f0000000a00)="c98e790e6a9be451e873d57b25ac01c32e93fb17d789d383667f0203ba2725bad26393e50148bdb1d31d6579c3a9152863afe88fb2c83c5ca3ef57b933320497e211e1cf19d2e8d2836fad190db50b48e0533c0da45f32bdee9c80822075b65b1c8b6c183311ea3d6d7a1afc02364ef5f02db9b2d9677d47f5c1edcdf22542466751", 0x82}], 0x2, &(0x7f0000000b00)=[@txtime={{0x18, 0x1, 0x3d, 0x101}}, @timestamping={{0x14, 0x1, 0x25, 0x100}}], 0x30}}, {{&(0x7f0000000b40)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x3, 0x3, {0xa, 0x4e24, 0x5, @rand_addr="1050466d602f7b9426c15ba9cbc4c60b", 0x4}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000bc0)="420dcbb7e9aebab4ae954abaa5409914664a3a777c789451bfbfdeb449984da6127ad2e63d8c516f6d2d8b4a288017672ec0932b1c63ceccd5a7f7bc270a402951ae8aca05b76bd1592a9afcf0b6171c59776293bae857e5d0882520442e65c0165d986834bb56b049a297f52d122209c754243f51859c08d0c72da0001de9587ccc37ebddac6381171d0210b64d12282083", 0x92}, {&(0x7f0000000c80)="ed8de8ce862608adebb483bec8eaa4678b7c144e3726d5a465dfa0d0c7e46d126f2682028f4082e27999f6d51c5bbdcee339e20ed1c13cd3fbdb905088a4f1036c71b5c48182089ccb9005791168fb01aa41edf510d4f5cd0d98b7e7d639ee58a9da7f45fbb2409ab5510ecf542bd7815bf8dc68370dfce23feb2db1ba8db82db8776f5b67cad64367ccef3657d7204c5c8d8edbe1e19bbe", 0x98}, {&(0x7f0000000d40)="b4ad82775ba4ffd4dbf8f02c3e270db6dbfebdc07c95ec8516e77212fdd9fa6a8e0e8639fc0ad96971c3c35e0d1c544da7f5d86b1d8a129fe441b2f66a626d1162a886f1eb744e2d9e", 0x49}], 0x3, &(0x7f0000000e00)=[@txtime={{0x18}}, @txtime={{0x18, 0x1, 0x3d, 0x6b6}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0x81}}, @mark={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0x401}}], 0xc0}}], 0x4, 0x0) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x400000000000) 03:20:19 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000470f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:19 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x5f, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a9"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:19 executing program 3: r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x50}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, r1, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x200}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @broadcast}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000844) [ 897.993276][T21707] FAT-fs (loop0): bogus number of reserved sectors [ 898.033816][T21707] FAT-fs (loop0): Can't find a valid FAT filesystem 03:20:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) syz_open_dev$loop(0x0, 0x2, 0x0) syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:19 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x52, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) splice(r0, &(0x7f0000000000), r0, &(0x7f0000000040), 0x2, 0xd) 03:20:20 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x5f, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a9"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:20 executing program 3: r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 898.481906][T21739] FAT-fs (loop0): bogus number of reserved sectors 03:20:20 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, &(0x7f0000000000)=""/66) [ 898.555148][T21739] FAT-fs (loop0): Can't find a valid FAT filesystem 03:20:20 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000570f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) syz_open_dev$loop(0x0, 0x2, 0x0) syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:20 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:20 executing program 3: syz_open_dev$loop(0x0, 0x0, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:20 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000000)) 03:20:20 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x5f, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a9"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:21 executing program 3: syz_open_dev$loop(0x0, 0x0, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 899.386401][T21794] FAT-fs (loop0): bogus number of reserved sectors 03:20:21 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') bind$netrom(r0, &(0x7f0000000140)={{0x3, @bcast, 0x6}, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]}, 0x80) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/197, 0xc5}], 0x1, 0x400000000000) [ 899.435542][T21794] FAT-fs (loop0): Can't find a valid FAT filesystem 03:20:21 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000670f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:21 executing program 1: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x151201, 0x0) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') r2 = inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x800) inotify_rm_watch(r1, r2) sendmsg(r1, &(0x7f0000002fc8)={0x0, 0xfffffffffffffe7e, 0x0, 0x0, &(0x7f0000000040)=ANY=[], 0xfffffcda}, 0x0) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x400000000000) fsetxattr(r1, &(0x7f0000000040)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000080)='net/sockstat6\x00', 0xe, 0x3) inotify_rm_watch(r1, r2) 03:20:21 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:21 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:21 executing program 3: syz_open_dev$loop(0x0, 0x0, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:21 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000280)='nstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x400000000000) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r2) [ 900.155827][T21841] FAT-fs (loop0): bogus number of reserved sectors [ 900.228374][T21841] FAT-fs (loop0): Can't find a valid FAT filesystem 03:20:22 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:22 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) getpgid(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000140)=[r1, r0], 0x2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:22 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x200200, 0x0) write$P9_RSTATFS(r0, &(0x7f0000000040)={0x43, 0x9, 0x1, {0x7, 0x3ff, 0xff, 0x3f, 0x2, 0x1, 0xffff, 0x9, 0x200}}, 0x43) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x400000000000) 03:20:22 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000770f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:22 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:22 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x400000000000) 03:20:22 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:22 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) getpgid(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000140)=[r1, r0], 0x2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 900.972491][T21887] FAT-fs (loop0): bogus number of reserved sectors 03:20:22 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0xfffffffffffffdab, &(0x7f0000000480)=ANY=[]}, 0x0) bind$isdn(r0, &(0x7f0000000000)={0x22, 0x5, 0x80000001, 0x1, 0x3}, 0x6) preadv(r0, &(0x7f00000001c0), 0x0, 0x400000000000) sendto(r0, &(0x7f0000000040)="44c9459ff7541ce12804f5ae74f57ca01c1ef682cd03f5e5c84d16de949c35235cb7279958d79efc70adf7c62acd98923ee4e27ae021a0c41f98a13879ebee8c03494d1dacaf96f39bade1fd4eb7cce5bcdabba7829889df64e7dc7e40af67594b75bfbe00d3ab36e5460df74da82f80b189152350a75e30a13037e19ea4d29695e07fe830a0094997e501688ac467d096a03a709be18f1c11ee7139a9f3c8ee81c202b33ef9b28b2d74e3232228b130cddf1ee281c4ecbeb960ee24b30c2acf339ae531d5b6d82f0728479299645de9f5b0dd04d130a200d5e062487dd5974608a69f29d43718ee4e7962d05e2506ad2ea4e62b1fce2d08", 0xf8, 0x40400c4, &(0x7f0000000140)=@generic={0x18, "37e7bdb4b0fc5e7f53d86091a39ce02e8c5e0d7202a95f9f62b7dac4dccee814296ab22136647d1431c8de38668633a773bf6b31347f124ad03b365eb9f63763a87ed5986738c8ca143cdb2cce89d2f9fb7fbeb4961eb926aedf8ce00e6750bb842d95707e69be65a520b7a722f4fc3310269461d6301f5faee0bd031113"}, 0x80) [ 901.079461][T21887] FAT-fs (loop0): Can't find a valid FAT filesystem 03:20:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:23 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) getpgid(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000140)=[r1, r0], 0x2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:23 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:23 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x101000, 0x0) 03:20:23 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(0x0, 0x0) [ 901.443533][T21884] FAT-fs (loop2): Directory bread(block 112) failed 03:20:23 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) fcntl$dupfd(r0, 0x406, r0) 03:20:23 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000870f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 901.791600][T21927] FAT-fs (loop0): bogus number of reserved sectors [ 901.820086][T21927] FAT-fs (loop0): Can't find a valid FAT filesystem 03:20:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:23 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(0x0, 0x0) 03:20:23 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={r0, &(0x7f00000002c0)="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", &(0x7f00000012c0)=""/4096}, 0x18) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 03:20:23 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:23 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:23 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(0x0, 0x0) 03:20:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:24 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)=0x0) kcmp(r1, r2, 0x5, r0, r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) [ 902.566298][T21951] FAT-fs (loop2): Directory bread(block 112) failed [ 902.586812][T21975] FAT-fs (loop0): invalid media value (0x00) [ 902.599319][T21975] FAT-fs (loop0): Can't find a valid FAT filesystem [ 902.634424][T21951] FAT-fs (loop2): Directory bread(block 113) failed 03:20:24 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 902.689415][T21951] FAT-fs (loop2): Directory bread(block 114) failed [ 902.729302][T21951] FAT-fs (loop2): Directory bread(block 115) failed 03:20:24 executing program 1: socketpair(0x5, 0x3, 0xfff, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f0000000080)=0xfffffffffffffffe, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x5) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x400000000000) [ 902.853674][T21951] FAT-fs (loop2): Directory bread(block 116) failed [ 902.912863][T21951] FAT-fs (loop2): Directory bread(block 117) failed [ 902.929856][T21951] FAT-fs (loop2): Directory bread(block 118) failed [ 902.940263][T21951] FAT-fs (loop2): Directory bread(block 119) failed [ 902.947174][T21951] FAT-fs (loop2): Directory bread(block 120) failed [ 902.954174][T21951] FAT-fs (loop2): Directory bread(block 121) failed 03:20:24 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000a70f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:24 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:24 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:24 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:24 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x400000000000) timerfd_create(0xd, 0x80800) 03:20:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x100000000000002c, 0x400000000000) [ 903.391656][T22019] FAT-fs (loop0): invalid media value (0x00) 03:20:25 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 903.448332][T22019] FAT-fs (loop0): Can't find a valid FAT filesystem 03:20:25 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:25 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:25 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 03:20:25 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002001070f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:25 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 903.988271][T22066] FAT-fs (loop0): invalid media value (0x00) 03:20:25 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) [ 904.038151][T22066] FAT-fs (loop0): Can't find a valid FAT filesystem 03:20:25 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:25 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 904.286654][T22076] FAT-fs (loop2): Directory bread(block 112) failed 03:20:26 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 904.329126][T22076] FAT-fs (loop2): Directory bread(block 113) failed 03:20:26 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) ptrace$getsig(0x4202, r1, 0xe4c, &(0x7f0000000040)) [ 904.381787][T22076] FAT-fs (loop2): Directory bread(block 114) failed [ 904.425352][T22076] FAT-fs (loop2): Directory bread(block 115) failed [ 904.475166][T22076] FAT-fs (loop2): Directory bread(block 116) failed [ 904.496323][T22076] FAT-fs (loop2): Directory bread(block 117) failed [ 904.521663][T22076] FAT-fs (loop2): Directory bread(block 118) failed [ 904.557906][T22076] FAT-fs (loop2): Directory bread(block 119) failed 03:20:26 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 904.609537][T22076] FAT-fs (loop2): Directory bread(block 120) failed [ 904.647133][T22076] FAT-fs (loop2): Directory bread(block 121) failed 03:20:26 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 904.747814][T22106] FAT-fs (loop0): invalid media value (0x00) 03:20:26 executing program 1: r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000000)='setgroups\x00') ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000040)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) syz_open_dev$dri(&(0x7f0000000300)='/dev/dri/card#\x00', 0x8040000000000000, 0xfffffffffffffffd) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x400000000000) fsconfig$FSCONFIG_SET_PATH_EMPTY(r1, 0x4, &(0x7f0000000140)='procwlan1[-&\x00', &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff) fsconfig$FSCONFIG_SET_BINARY(r1, 0x2, &(0x7f0000000100)='/dev/dri/card#\x00', &(0x7f0000000200)="662479f466a1205ea7b729c9699f0b3acca45262dc7aeb33f64809af24abdee7149130e5dbe85f23178ce6fe4fba2d42e157ba260964afc57e1fd718cee02001984c28fa78862d2080ca97e941384a5f69e913e5d6fff4875fcd2efc4527aee2fd58ad8d349b58b7fac9e89f9a0359f4f92a47869ce99ca0a31cbc437555851a46f0e2bbd7baec2948cb6120993b75c710b566fd658b75dd715ad725cf0d126f975713a79cc4a5c86488e74c648e81689210aba72550be", 0xb7) utime(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0xce56474, 0x7fffffff}) [ 904.823409][T22106] FAT-fs (loop0): Can't find a valid FAT filesystem 03:20:26 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002001470f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:26 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:26 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:26 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:26 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xd21b) r1 = getpgid(0xffffffffffffffff) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x10001) ioctl$KVM_PPC_GET_PVINFO(r0, 0x4080aea1, &(0x7f0000000000)=""/230) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x100000000, 0x335cc75, 0x262e20d6, 0x0, 0x0, 0x8, 0x0, 0x4, 0x100, 0x3f, 0x5ae5, 0x0, 0x9, 0x5, 0xbe, 0x200, 0x5, 0x4, 0xf, 0x3, 0x2, 0xfff, 0x838, 0x5, 0x7fff, 0x500000000000000, 0x9, 0x101, 0x81, 0x1, 0x8, 0xfffffffffffffff9, 0xd00, 0x4d, 0x10000, 0x9, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000180)}, 0x800, 0x40, 0x6, 0x4, 0x5f, 0x2, 0x100}, r2, 0x2, r0, 0x8) ioctl$VIDIOC_S_OUTPUT(r0, 0xc004562f, &(0x7f0000000140)=0x1ff) preadv(r0, &(0x7f00000017c0), 0x0, 0x400000000000) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000100)) 03:20:27 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 905.411187][T22154] FAT-fs (loop0): invalid media value (0x00) [ 905.457118][T22154] FAT-fs (loop0): Can't find a valid FAT filesystem 03:20:27 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x5c, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:27 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:27 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[]}, 0x4000) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x6, 0x40011, r0, 0x0) 03:20:27 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 905.613805][T22155] FAT-fs (loop2): Directory bread(block 112) failed [ 905.633041][T22155] FAT-fs (loop2): Directory bread(block 113) failed [ 905.670598][T22155] FAT-fs (loop2): Directory bread(block 114) failed [ 905.714217][T22155] FAT-fs (loop2): Directory bread(block 115) failed [ 905.746142][T22155] FAT-fs (loop2): Directory bread(block 116) failed 03:20:27 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 905.808558][T22155] FAT-fs (loop2): Directory bread(block 117) failed [ 905.817789][T22155] FAT-fs (loop2): Directory bread(block 118) failed 03:20:27 executing program 1: r0 = socket(0x5, 0x3, 0x4) sendto$rose(r0, &(0x7f0000000000)="629215c24181e049254b1853a19de24946fbab05f1ec53a8a5c0cf027ed50142a20741c05d3358c3bb6f32176e6514906df60faafc63f688fcb1cf0719543ce63f63dcf6e83fc5bce9081d11fa02402fb112ad73bcdfa8a2850d3748d41a3a5e367e2dd2e784f3fbacd6d43219830c29bd3082679c1bf55d7caa16426a230464b324e1b1d3c5ec2b298f2379041b8c1f13db56de3b9b78d756c4e49af6cb138024cddf79bc619a7218daa4e122", 0xad, 0x1, &(0x7f00000000c0)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, 0x1, [@bcast, @null, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x40) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') tee(r0, r0, 0x3c5f, 0x1) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x400000000000) listen(r1, 0xfcf) [ 905.854659][T22155] FAT-fs (loop2): Directory bread(block 119) failed [ 905.882862][T22155] FAT-fs (loop2): Directory bread(block 120) failed [ 905.924960][T22155] FAT-fs (loop2): Directory bread(block 121) failed [ 905.963074][T22194] FAT-fs (loop0): invalid media value (0x00) [ 906.043928][T22194] FAT-fs (loop0): Can't find a valid FAT filesystem 03:20:27 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002001e70f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:27 executing program 4: ioctl(0xffffffffffffffff, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:27 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x5c, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:27 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:27 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7", 0x15}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:28 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x21, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f0000000080), 0x0, 0x400000000000) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x4e22, @local}, {0x0, @random="350ea133ba64"}, 0x4, {0x2, 0x4e20, @local}, 'syz_tun\x00'}) 03:20:28 executing program 4: ioctl(0xffffffffffffffff, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:28 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 906.649595][T22227] FAT-fs (loop0): invalid media value (0x00) [ 906.686566][T22227] FAT-fs (loop0): Can't find a valid FAT filesystem 03:20:28 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 03:20:28 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7", 0x15}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:28 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000223f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:28 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x5c, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:28 executing program 4: ioctl(0xffffffffffffffff, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:28 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:28 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7f, 0x2000) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = socket$inet6(0xa, 0x804, 0xffffffffffffff97) setsockopt$TIPC_MCAST_REPLICAST(r0, 0x10f, 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r2, &(0x7f00000017c0), 0x1fe, 0x400000000000) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000040)={0x3, 0xf9, 0x1}) fdatasync(r1) ptrace$cont(0x200000000000009, 0x0, 0x1, 0x8) 03:20:28 executing program 1: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000180)='net/l2cap\x00') ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x2df, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r1, &(0x7f0000000100), 0x0, 0x3ffffffffffd) getpeername(r1, &(0x7f0000000000)=@rc, &(0x7f0000000080)=0x80) perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0x70, 0x100000001, 0x7, 0x9, 0xffffffff80000001, 0x0, 0x3, 0x40004, 0x2, 0x7, 0xff, 0x100000001, 0x10000, 0x3, 0x3f, 0xfffffffffffffffe, 0x401, 0x9, 0x0, 0xfffffffffffeffff, 0x3ffc, 0x6, 0x3, 0x1, 0xfffffffffffff001, 0x22, 0x4, 0x1, 0xf24, 0x0, 0x7fff, 0x2, 0x5, 0x9, 0x6, 0x3f, 0x0, 0x0, 0x3, 0x5, @perf_config_ext={0x7fff, 0x8}, 0x0, 0x7, 0x0, 0x6, 0x1, 0x5}, r1, 0x7, r1, 0x3) [ 907.353021][T22268] FAT-fs (loop0): invalid media value (0x00) [ 907.389049][T22268] FAT-fs (loop0): Can't find a valid FAT filesystem 03:20:29 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:29 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:29 executing program 1: io_setup(0x1, &(0x7f0000000000)=0x0) io_pgetevents(r0, 0x5, 0x7, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000000140)={0x77359400}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') ioctl$TIOCSTI(r1, 0x5412, 0xb9d) accept4(r1, &(0x7f0000000180)=@rc, &(0x7f0000000200)=0x80, 0x80000) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) ioctl$UI_SET_KEYBIT(r1, 0x40045565, 0x165) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x400000000000) 03:20:29 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x5c, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:29 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7", 0x15}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:29 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000225f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:29 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:29 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 908.131078][T22315] FAT-fs (loop0): invalid media value (0x00) [ 908.137784][T22315] FAT-fs (loop0): Can't find a valid FAT filesystem 03:20:29 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:29 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:30 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:30 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, 0x0) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:30 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200022af7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:30 executing program 1: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/arp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000080)=""/192, 0x4f}, {&(0x7f0000000500)=""/68, 0x44}, {&(0x7f00000001c0)=""/107, 0x6b}, {&(0x7f0000000240)=""/131, 0x83}, {&(0x7f0000000300)=""/155, 0x9b}, {&(0x7f00000003c0)=""/153, 0x99}], 0x6, 0x400000000000) 03:20:30 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:30 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:30 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) write$P9_RRENAME(r0, &(0x7f0000000000)={0x7, 0x15, 0x1}, 0x7) 03:20:30 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, 0x0) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:30 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000140)='bond0\x00'}) 03:20:31 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:31 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200022bf7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:31 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x8000, 0x0) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bpq0='bpq0\x00', 0x40, 'syz1\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0xd8, 0x7, [@default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) sendmsg(r1, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[]}, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000)=0xc4, 0x4) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x47, 0x3, [0x6, 0x4, 0x4059]}, &(0x7f0000000140)=0xe) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000180)={r2, 0x6}, &(0x7f00000001c0)=0x8) 03:20:31 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, 0x0) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:31 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, 0x0) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, 0x0) syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:31 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:31 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) r1 = getuid() syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffff000, 0x2, &(0x7f0000000180)=[{&(0x7f0000000080)="9a76e97a2076f6d9f1dce06e6a7bac5189efa2f67677420c6aa65452bf5c724a9249b25a7ec9f70cf3075ddcc8face968aa89780363c82b49585520daf05b248b8390c35c3390daa2524b20954", 0x4d, 0x7}, {&(0x7f0000000100)="e3422e0c60509741943a87dad6934279616d559a653702ddc9478fa8e08b2fd56c3ca2cef2954bc51af09b1899d6ce1dbcb91146f45ed9e3ed4ea5a6b88eb0a827fa", 0x42, 0x3}], 0x400, &(0x7f00000001c0)={[{@shortname_lower='shortname=lower'}, {@utf8no='utf8=0'}, {@shortname_winnt='shortname=winnt'}, {@rodir='rodir'}], [{@uid_lt={'uid<', r1}}]}) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 03:20:31 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200022df7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:31 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(0x0, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, 0x0) syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:32 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x56, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:32 executing program 1: r0 = syz_open_dev$cec(&(0x7f00000002c0)='/dev/cec#\x00', 0x0, 0x2) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f0000000400)={{&(0x7f00000001c0)=""/151, 0x97}, &(0x7f00000003c0), 0x3}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000040)=""/81, &(0x7f00000000c0)=0x51) preadv(r1, &(0x7f00000017c0), 0x17c, 0x3ffffffffffe) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) modify_ldt$read_default(0x2, &(0x7f0000000100)=""/187, 0xbb) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xffe) 03:20:32 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:32 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(0x0, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, 0x0) syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:32 executing program 1: r0 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000001a80)) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/so\xba\xeeJd\xe1\xa5\"lckstat6\x00') ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f00000002c0)={r1, 0xfff, 0x6, "02791509ae2a84655e1c3bdae6678cab0caef0265eb2ecbc5cb257445727d6c334c4bc886d36ddcf1dc3240136c81f6a4b05619af42cc71e7445e26f07fdf02b90ffe180d7c0187f6e5a72d384dac72bc3eaf5e9e1bc69298e459f4e10371dc65603c33188e3d4aba9179c60f146217d3a16429e273397f5a9bd94dbe9b8282012beb2d4997422f1ea3655d56fafcd1be855a456859475b44ec35ebe0a8a0328f18018cb45"}) sendmsg(r0, &(0x7f0000001740)={&(0x7f0000000240)=@pptp={0x18, 0x2, {0x2, @broadcast}}, 0x23, &(0x7f00000016c0)=[{&(0x7f0000000400)="7f6840e5434db571da59fa447ee56763ae54e312150744362552c32f3378c65ed40df0c78b67fdbabfc12229f44c4847e1bd9da44852f22b8f65cbc27a7b26f353a1b24a8578f6df53ddd1dd963fdd105005a9e548138d07591856d5ad9304159aeffa57f7ea3a1962ef4f600dd1ec6c", 0x70}, {&(0x7f0000000480)="54fd99c8fad24c072efa46191e69e3e2c27b3a238ed57a41d71ae5b5c278716be34e5932302e06ba657aff0e259d53cd9f8353427809b281fc3416d670969a42919a7bebd836e08079cb22", 0x4b}, {&(0x7f0000000500)="659d3b4d69d2d2536b0620c44a7049f32386747706723bb2afd5b1ce4d3a99c0840dabc9b7121c660d0c886696eaa0c4a5a358a14e32716e606e3e568dee5b7d206f03c252ef18a5f0da4a3323c9e57188030488e1b0d817491a5246871b8903f001ebcda064a630e2e29976d44738b080ba16a0670523c728ee06d8af7b7d40b7597e17fb2f42eabad6da4ff96075996316e3433d4009e53982d356ab488c3bd46b070183ed736fe6c462839e", 0xad}, {&(0x7f00000005c0)="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", 0x1000}, {&(0x7f00000015c0)="4751b888682a9e4806aba1baaa138921626b9e8e4e2ec28b5ae4bad9c5cfed4d2af917de9abd70f5ad6a76812bfd999e60a7c28bdfd91ae7b5a16fe8069fc7e4008855336a19d13af2f9796090e0fd0c9eed4b757d24891684d2b4dc51b8a9dc", 0x60}, {&(0x7f0000001640)="d988edf36e4826a1d6e1191100ec634be35d6b627944cbde8358e6db63052832c44d492f8723b3f134e260c59f63465439cdf3c84cda877363a0eba46ab66961f62048355dddc5bcc408bf53f31216f3a1fe26fb1ccc32", 0x57}, {&(0x7f0000000380)="219308a25b93d49237c5e9d8d980b00839dd7d8e8def2b3da67fc5ccd1151699aa7e00e1c69ddc8106bb6c232f8c194911cc9501d884", 0x36}], 0x7}, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x1b1, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f00000000c0)=ANY=[@ANYRES64, @ANYRESOCT=r1, @ANYRES16=r1, @ANYRESHEX=r1], @ANYRES32=0x0], @ANYRES16=r1, @ANYRES32=r1, @ANYBLOB="d6cd3bca26877b00bb355e787b8f0008e73adad943ecc4ac", @ANYPTR64=&(0x7f0000000080)=ANY=[@ANYRES16=r1, @ANYRES32=r1, @ANYPTR=&(0x7f0000000040)=ANY=[@ANYRESHEX=r1, @ANYRESHEX=r1, @ANYPTR64], @ANYRESDEC=r1]]}, 0x4) syz_mount_image$vfat(&(0x7f0000001780)='vfat\x00', &(0x7f00000017c0)='./file0\x00', 0x9, 0x2, &(0x7f0000001a00)=[{&(0x7f0000001800)="1885c03ca08274911fe859a7479db4da86cb71f47419441d4abe45ea760a583bd23dfde4002e297db41e4ce6efcb58f0ae74db6021224eff996db407c9951b882753021ff5409832df2ff5ae3cc0948fbc8dfd8402a209cf4af611622c69b4a73817c1d781f1e97bed4b0bda6fccb2bd858a6d94b0c6450bc8d37faab2e95eb87824f4d0108e78b477fe5ee050dd3c0221e839da8454281e66a2ee5148738f7d23e1b2426e20f935db9b037bfc66e970bcfa6a26b6b02c900ffe3633763151f610", 0xc1}, {&(0x7f0000001900)="87a35b39cfb8759cc326e5e778a6e5265c3868ff3b09efea8c3a7f5e244f239f4090b58b78379a2ef788553cc86e915d571979683109b359543c5e626d977d31daf0d47749fffc0d289732e370409cfd80199bfeffbb51fe505f5676ad81638cef3df044dd414dde236b172c0ad07c0183363f7ab0c02429a905ae6a87e0ffa3e3421d089fde3eda989cb34a70aec9005c7d78fc59dd7b3ea346af60f0a03058fd0d826b46e6427a772664ebd099d083385e41b845e64dddba1e29ce3c735224e5e2bb344c21d264573f08f45966c1e3cd493951d9c93dcce21ff5d7c8cfc9a642efb97323fd4fe136ccbdf8d6c6f98122cf094ca19d3dcb8a", 0xf9, 0xffffffff00000001}], 0x200000, &(0x7f0000001a40)={[{@shortname_winnt='shortname=winnt'}, {@utf8no='utf8=0'}, {@utf8no='utf8=0'}, {@rodir='rodir'}, {@rodir='rodir'}, {@utf8no='utf8=0'}], [{@obj_user={'obj_user', 0x3d, '%)%$'}}]}) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x400000000000) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000000)=0x237c, 0x2) 03:20:32 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200022ef7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:32 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x56, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:32 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(0x0, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)) syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:32 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:33 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000280)='net/s\xea\x9c*\xf1\x8b\xa9Qh\xbb') r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r2, 0x4, 0x70bd2a, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x19c, 0xe2, 0x6, 0x101}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x84}, 0x4040000) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x400000000000) ioctl$SG_GET_KEEP_ORPHAN(r1, 0x2288, &(0x7f0000000000)) 03:20:33 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000000)={0x1, 0x1, 0x4, {0x0, 0x3, 0x3, 0x40}}) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) 03:20:33 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)) syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:33 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000230f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:33 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:33 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 03:20:33 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x0, &(0x7f00000001c0)}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:33 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)) syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') ioctl$LOOP_SET_FD(r0, 0x4c00, r0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 03:20:34 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(0x0, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:34 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x0, &(0x7f00000001c0)}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:34 executing program 1: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x1, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffff9c, 0xc0184900, &(0x7f0000000100)={0x6, 0x20, 0x1, 0xffffffffffffff9c}) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x20000, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r5 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/attr/current\x00', 0x2, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x900, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000240)=[r1, r2, r3, r4, r5, r6, r7, r8], 0x8) r9 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') ioctl$sock_FIOGETOWN(r9, 0x8903, &(0x7f0000000000)=0x0) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000080)) write$FUSE_LK(r9, &(0x7f0000000040)={0x28, 0xfffffffffffffff5, 0x7, {{0x39e, 0x2, 0x2, r10}}}, 0x28) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r9, &(0x7f00000017c0), 0x1fe, 0x400000000000) prctl$PR_GET_KEEPCAPS(0x7) 03:20:34 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:34 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000258f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0b") syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:34 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x400000000000) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) connect$netrom(r0, &(0x7f0000000040)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x8}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) 03:20:34 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x4a, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a062075"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:34 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x0, &(0x7f00000001c0)}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:35 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', 0x0, 0x0, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0b") syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:35 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') accept4$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14, 0x80800) recvmmsg(r0, &(0x7f0000004340)=[{{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)=""/135, 0x87}, {&(0x7f00000005c0)=""/170, 0xaa}, {&(0x7f0000000680)=""/197, 0xc5}], 0x3, &(0x7f00000007c0)=""/4096, 0x1000}, 0x1}, {{&(0x7f00000017c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000001900)=[{&(0x7f0000001840)=""/135, 0x87}], 0x1, &(0x7f0000001940)=""/214, 0xd6}, 0xfffffffffffffff9}, {{&(0x7f0000001a40)=@ax25={{0x3, @bcast}, [@default, @remote, @rose, @rose, @netrom, @rose, @netrom, @default]}, 0x80, &(0x7f0000001e00)=[{&(0x7f0000001ac0)=""/38, 0x26}, {&(0x7f0000001b00)=""/185, 0xb9}, {&(0x7f0000001bc0)=""/184, 0xb8}, {&(0x7f0000001c80)=""/110, 0x6e}, {&(0x7f0000001d00)=""/254, 0xfe}], 0x5, &(0x7f0000001e80)=""/4096, 0x1000}, 0x9}, {{&(0x7f0000002e80)=@nl=@unspec, 0x80, &(0x7f00000041c0)=[{&(0x7f0000002f00)=""/173, 0xad}, {&(0x7f0000003000)=""/67, 0x43}, {&(0x7f0000003080)=""/225, 0xe1}, {&(0x7f0000003180)=""/59, 0x3b}, {&(0x7f00000031c0)=""/4096, 0x1000}], 0x5, &(0x7f0000004240)=""/201, 0xc9}, 0x3}], 0x4, 0x40, &(0x7f0000004440)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000004500)={{{@in=@multicast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000004600)=0xe8) r5 = accept$packet(r0, &(0x7f0000004640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004680)=0x14) getpeername$packet(r0, &(0x7f00000046c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000004780)={{{@in=@multicast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@empty}}, &(0x7f0000004880)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f000000b100)={@mcast2, 0x0}, &(0x7f000000b140)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000b180)={'erspan0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f000000b1c0)={{{@in6=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@loopback}}, &(0x7f000000b2c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000b3c0)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f000000b400)={{{@in=@empty, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f000000b500)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f000000bd40)={0x0, @broadcast, @empty}, &(0x7f000000bd80)=0xc) getsockname$packet(r0, &(0x7f000000bdc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000be00)=0x14) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000180)=0x4609, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f000000bf00)={'vcan0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f000000bf40)={{{@in=@broadcast, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f000000c040)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f000000c080)={@rand_addr, 0x0}, &(0x7f000000c0c0)=0x14) fstatfs(r5, &(0x7f0000000080)=""/163) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f000000c100)={0x0, @broadcast, @dev}, &(0x7f000000c140)=0xc) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f000000c1c0)={@dev, @multicast1, 0x0}, &(0x7f000000c200)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f000000c280)={{{@in=@initdev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f000000c380)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f000000c3c0)={{{@in6=@mcast1, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f000000c4c0)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f000000cc00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f000000cbc0)={&(0x7f000000c500)={0x6b8, r1, 0x2, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8, 0x1, r2}, {0x164, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r4}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xdd13}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}]}}, {{0x8, 0x1, r7}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r9}, {0x260, 0x2, [{0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x1, 0x100000000, 0x4, 0x50f}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2fff}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xb}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x8000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffeffff}}, {0x8, 0x6, r14}}}]}}, {{0x8, 0x1, r15}, {0x12c, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r16}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x8001}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x80000000}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r18}, {0xc8, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x646}}, {0x8, 0x6, r19}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1000}}, {0x8}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}]}}, {{0x8, 0x1, r20}, {0x7c, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}]}}]}, 0x6b8}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) 03:20:35 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200025cf7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:35 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x31, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0b") syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:35 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={r0, 0xc0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, &(0x7f0000000040)={0x1, 0x1}, 0x0, 0x0, &(0x7f0000000080)={0x1, 0x9, 0x3, 0x4}, &(0x7f00000000c0)=0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x100000001}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240)=r1, 0x4) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 03:20:35 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', 0x0, 0x0, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:35 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x4a, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a062075"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:35 executing program 1: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x4040, 0x0) ioctl$SG_GET_RESERVED_SIZE(r0, 0x2272, &(0x7f0000000080)) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x400000000000) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000000)={0xff, @multicast1, 0x4e24, 0x4, 'rr\x00', 0x0, 0x9, 0x17}, 0xffffffffffffff09) 03:20:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7b") syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:36 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000263f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:36 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x31, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:36 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', 0x0, 0x0, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:36 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xfff) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYRESOCT=r0, @ANYRESHEX=r0, @ANYRESDEC, @ANYRESHEX=r0, @ANYPTR, @ANYRES16=r0, @ANYRES32, @ANYRES16=r0], 0x5f}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 03:20:36 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x31, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7b") syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:36 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x31, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:36 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) r1 = msgget(0x2, 0x100) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@loopback, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) fstat(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RCLUNK(r0, &(0x7f0000002300)={0x7, 0x79, 0x2}, 0x7) r5 = getuid() getgroups(0xa, &(0x7f0000000b00)=[0x0, 0xee01, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00, 0xee00, 0xffffffffffffffff, 0xee01, 0xee00]) syz_mount_image$iso9660(&(0x7f0000000c00)='iso9660\x00', &(0x7f0000000c40)='./file0\x00', 0x4, 0x9, &(0x7f0000002180)=[{&(0x7f0000000c80)="d48df7889f2cefa620691cb0f238bc19ad9e4498bad4a86fb5aec9edd42ef3b51dd1b01397978eeefd76983bd78b401a7b8a378b58b0ba3a39be6c535327562db3f18c9a47bb6c8ae59038c4558412f93bbe19ee7de53190837c7f5c86c8076227ab4b5adcbf863f0c8f95dae5134022d9612538cca1a4becb0ca3d846e5ff2d5f3b6d0f934d9f618d", 0x89, 0x9}, {&(0x7f0000000d40)="a66fcec5f38645c74835a428e88f043168dc670b51b2c7d2124f1e5e78e529c4988a8166307c89b4fb77a1ea68cfe60c694750cd465ab202f5e5c6a3e2b74d96d431a555eaa3f1400157544d9f4a29f816485ff03f50e3059ca79bc5220d74dd64924a2a7c41c168beba4ed8dd084f93a84fa710fad09cf8", 0x78, 0x7}, {&(0x7f0000000e40)="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", 0x1000, 0x500}, {&(0x7f0000001e40)="19a0bb4b88cee12a602ded0e7467d4aa2a6a71eee6fe1d7e25e46e7b6cd9e613f2a6c234be26d946222d99f0795c9b312ab882d1feb2782686bf17bb6848a0f46e0a04f52c1ef401b4364d5aa48d7b2cd367d02771a1d5e0888414fe449cff30886876b3b0460eca2390452a09e7148a3da5c82c21a0bb", 0x77, 0x5}, {&(0x7f0000001ec0)="4565aea25bb04ba733032ec8f46a839e005a69b349aebfc50fbc78c2bc946a4449e8612ef1ea444af6809559a076a5999ffda93f74e931f8ebee9fba43f937656b13f1d97688a6215d42c526228f0f35eb627a6d79d023b0b2650e3c59cc9cfddf28cda72c44acc5264328815325c3131cf5da80025c8977faebb7ae88be54ee40a81cc5eb4da7c489c3520005b879a44af3702a944998ba5c1297f57fabaabbaa2d12e22a05b8ae2d467c96ea468d2df39c5bf41ea39b6d863716304e7e9313c6774db09981ac5389720b50b607cb2595eb9e7a12e0b22757a07fae1d839b1c0b3171d763bb62632946b75033ebbf3ed3", 0xf1, 0x2}, {&(0x7f0000000dc0)="d9bdf1dfc74ef758685fa365206224ebc79e597bb01d05a5ae7bbe7db3d2db8e6daa5d8c86a20dddb069a0", 0x2b, 0x5a66}, {&(0x7f0000001fc0)="229b7573c257ca48ebfcf82a074d138efe8a630b1752642e1d927b74e3dc6f03aef6fbe810a337f24c5122a38bff377b66b4bd74a0cf300f7250d7a091f238e9a574eabcffd20cf9495bfabeeda57932d0459b30a35a63e22e22b454307c7d05858e13bc4c97dc75a11939b0b80a81b7a05f7633c2f8e98a09752e44e5be03d8c278069590facc2e51d09873e8834ccd63c1a8624f2aefc3dbb3ade4c1347d1aa18291385658fe1b5b305f8f3d4fc0f12c609caf8c59c69aae9352b7ce6cbc92eb6fc6369be2c54aba7fe14f2a26cc9fc5a652c575eecae656c472fceb8bd040aa9289921725371e149c124d5e70", 0xee}, {&(0x7f0000003000)="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", 0x1000, 0x7fff}, {&(0x7f00000020c0)="1730433084a37d3be8055e8543ba7362b428e942df5a5410963c6643f14e8bbb3832adc31636e83afe92e588c9931844f021bffc3a5fc72a04f7b52a182480c2be869fa8ddccdb70c29282eba7266f18281193df05d65d782946936569a61921259884749005e046237a00e11a897f49062901eb924059da06d58f200f41a1d88762b5baf36f6df635d23af7b41bfccc37ed483c90359894a8904e05cb9ebb5d685c4914e0d9aaed4ea3f40ec4ad380d726967d56249", 0xb6, 0x7}], 0x80000, &(0x7f0000002280)={[{@nocompress='nocompress'}], [{@hash='hash'}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@seclabel='seclabel'}, {@fowner_lt={'fowner<', r3}}]}) r7 = getpid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000b40)=0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000b80)={{0x1f, r2, r4, r5, r6, 0x21, 0x9}, 0x1, 0x70000000000, 0x1, 0x4550, 0xff, 0x2, r7, r8}) r9 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r9, &(0x7f0000000080)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r9, 0x40045564, 0x14) ioctl$UI_DEV_CREATE(r9, 0x5501) write$uinput_user_dev(r9, &(0x7f0000000600)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}, 0x45c) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) preadv(r9, &(0x7f00000017c0), 0x0, 0x400000000000) setresuid(r3, r2, r5) 03:20:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7b") syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:36 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[], 0x0, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:36 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000264f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 915.408012][T22768] input: syz1 as /devices/virtual/input/input7 03:20:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be0") syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:37 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x49, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:37 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', 0x0, 0x0, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 915.678542][T22768] input: syz1 as /devices/virtual/input/input8 03:20:37 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[], 0x0, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:37 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x363, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES64=r0, @ANYRES32=0x0]}, 0x80) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000)=0x200, 0x4) 03:20:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be0") syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:37 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000269f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:37 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x4a, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a062075"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:37 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x49, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:37 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000000)=""/78, &(0x7f0000000080)=0x4e) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 03:20:37 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[], 0x0, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be0") syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:38 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x4, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7, 0x7, 0x0, 0x4, 0xb, 0x1d, "0f2e5d693b68fc23cdb427fd698237e3a2a9b669b570012123daef8b15fa6172a9be3dcd4e2b62a91d9703c3e0d42e5616e061dca0ccd5623a6f9f76b5f7ae48", "a73a8695699c2350987b77b71ae374c7b41344cef616bedfc69f7e61cdb4675f7a8abe0d653849f5a08ab5c7c57dc43e90a6010fd1dd084c7dc2019ddab97fdf", "5e0634b869738abf30ab878186190de25ab323d43156d2fc3f7836631bd453fc", [0x0, 0x1c000]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x24000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000040)="2f8057f66dcc9eba357cf0b89f2b12c9d586bec3ec056f80e7e00c6a73a99c642bf4b8f8c4e531417cd9", 0x2a, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x400000000000) 03:20:38 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x31, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:38 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200026cf7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:38 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x49, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:38 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) prctl$PR_GET_KEEPCAPS(0x7) 03:20:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(0x0, 0x3, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:38 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:38 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000080)='\x06\xe4\xcc\x06\xc9\xfeK\xae', 0xffffffffffffffff}, 0x30) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) r0 = getpid() getpgid(r0) r1 = getpgid(0xffffffffffffffff) r2 = syz_open_procfs(r1, &(0x7f0000000000)='\x06\xe4\xcc\x06\xc9\xfeK\xae') preadv(r2, &(0x7f00000017c0), 0x1fe, 0x400000000000) 03:20:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(0x0, 0x0, 0x80) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:39 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:39 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x2ce, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x800) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x86, 0x200101) 03:20:39 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xcb, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) dup2(r0, r1) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_256={{0x304}, "502b9fdf57dcfe21", "4efcf0cd78ac0fd9d43071201668cd682130965022e378a8a5a7f1e9e3f733bb", "cb5d5d48", "03c24f2867ca3439"}, 0x38) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff5d, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x400000000000) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x5, 0x400000) ioctl$PPPIOCGDEBUG(r2, 0x80047441, &(0x7f0000000040)) 03:20:39 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x55, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e4761"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:39 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200026ff7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 917.713448][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:20:39 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) getsockopt$inet_tcp_int(r0, 0x6, 0x2b, &(0x7f0000000000), &(0x7f0000000040)=0x4) 03:20:39 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:39 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x55, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e4761"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:39 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x55, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e4761"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:39 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x7, 0x200000) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/sockstat6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r1, &(0x7f0000000000), 0x0, 0x400000000000) 03:20:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:40 executing program 1: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200026cf7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:40 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000273f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:40 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x55, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e4761"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:40 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:40 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:40 executing program 1: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200026cf7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:40 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000275f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:40 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x5b, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:40 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:41 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) lsetxattr$security_evm(0x0, &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:41 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x5b, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:41 executing program 1: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200026cf7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:41 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:41 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000278f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) lsetxattr$security_evm(0x0, &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:41 executing program 1: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200026cf7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) 03:20:42 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:42 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) lsetxattr$security_evm(0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:42 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x5b, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:42 executing program 1: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200026cf7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) 03:20:42 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x7}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:42 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:42 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 921.225410][T23109] FAT-fs (loop2): bogus number of reserved sectors 03:20:42 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x5e, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:42 executing program 1: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200026cf7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) [ 921.278984][T23109] FAT-fs (loop2): Can't find a valid FAT filesystem 03:20:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:43 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x1e}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:43 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) r2 = syz_open_dev$loop(0x0, 0x2, 0x0) r3 = getpgid(0x0) r4 = perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24, 0x2) syz_open_procfs(r3, &(0x7f0000000480)='timers\x00') dup2(r2, r2) r5 = syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3, 0x80) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r6, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="040036"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r6, 0x2, &(0x7f0000000140)=[r7, r6, r4], 0x3) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r8) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:43 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x5e, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:43 executing program 1: syz_open_dev$loop(0x0, 0x2, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200026cf7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:43 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:44 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16, 0x2}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:44 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x5e, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:44 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:44 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:44 executing program 1: syz_open_dev$loop(0x0, 0x2, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200026cf7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 922.827459][T23201] FAT-fs (loop2): invalid media value (0x70) [ 922.942115][T23201] FAT-fs (loop2): Can't find a valid FAT filesystem 03:20:44 executing program 1: syz_open_dev$loop(0x0, 0x2, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200026cf7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:44 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:44 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x60, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 923.272966][T23206] FAT-fs (loop2): invalid media value (0x70) [ 923.299096][T23206] FAT-fs (loop2): Can't find a valid FAT filesystem 03:20:45 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, r2, r1], 0x3) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:45 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16, 0x3}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:45 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731f"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:45 executing program 1: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200026cf7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:45 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, r2, r1], 0x3) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 923.860063][T23261] FAT-fs (loop2): invalid media value (0x02) [ 923.889767][T23261] FAT-fs (loop2): Can't find a valid FAT filesystem 03:20:45 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x60, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:45 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16, 0x4}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:45 executing program 1: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200026cf7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:46 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731f"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:46 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x60, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:46 executing program 1: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200026cf7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 924.751812][T23306] FAT-fs (loop2): invalid media value (0x00) 03:20:46 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200026cf7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 924.798954][T23306] FAT-fs (loop2): Can't find a valid FAT filesystem 03:20:46 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731f"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 925.066206][T23336] FAT-fs (loop2): invalid media value (0x00) [ 925.124822][T23336] FAT-fs (loop2): Can't find a valid FAT filesystem 03:20:46 executing program 1: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) fchdir(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200026cf7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:46 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(0x0, 0x0) 03:20:46 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16, 0x5}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:47 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200026cf7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:47 executing program 1: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) fchdir(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200026cf7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:47 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:47 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(0x0, 0x0) [ 925.670363][T23367] FAT-fs (loop2): bogus number of FAT structure [ 925.692143][T23367] FAT-fs (loop2): Can't find a valid FAT filesystem 03:20:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:47 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r3, r2], 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7", 0x15}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x62, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c87a"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:47 executing program 1: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) fchdir(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200026cf7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:47 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16, 0x6}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:47 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:47 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r3, r2, r1], 0x3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(0x0, 0x0) 03:20:48 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:48 executing program 1: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200026cf7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:48 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 926.722317][T23422] FAT-fs (loop2): invalid media value (0x00) [ 926.782277][T23422] FAT-fs (loop2): Can't find a valid FAT filesystem 03:20:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(0x0, &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:48 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002040270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:48 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b353275"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:48 executing program 1: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200026cf7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 927.093331][T23459] FAT-fs (loop2): invalid media value (0x00) [ 927.110192][T23459] FAT-fs (loop2): Can't find a valid FAT filesystem 03:20:48 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b3532"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:48 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16, 0x7}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:49 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16, 0x6}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:49 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(0x0, &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 927.616671][T23478] FAT-fs (loop2): invalid media value (0x01) 03:20:49 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b3532"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 927.725455][T23478] FAT-fs (loop2): Can't find a valid FAT filesystem [ 927.792579][T23495] FAT-fs (loop5): invalid media value (0x00) 03:20:49 executing program 1: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200026cf7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 927.842026][T23495] FAT-fs (loop5): Can't find a valid FAT filesystem 03:20:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(0x0, &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:49 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16, 0x8}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:49 executing program 0: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:49 executing program 5: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b3532"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:49 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b3532"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:50 executing program 1: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200026cf7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', 0x0, 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 928.744873][T23531] FAT-fs (loop2): invalid media value (0x04) [ 928.839149][T23531] FAT-fs (loop2): Can't find a valid FAT filesystem 03:20:50 executing program 5: request_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000080)={'syz'}, 0x0, 0xfffffffffffffffe) 03:20:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', 0x0, 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:50 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b35"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 929.048829][T23574] FAT-fs (loop2): invalid media value (0x04) [ 929.075403][T23574] FAT-fs (loop2): Can't find a valid FAT filesystem 03:20:50 executing program 1: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200026cf7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:50 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc080aebe, &(0x7f0000000080)=ANY=[]) 03:20:50 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16, 0xa}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:50 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000780)=0x32, 0x4) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x1f4) 03:20:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', 0x0, 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:51 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b35"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:51 executing program 1: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200026cf7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 929.616927][T23596] FAT-fs (loop2): invalid media value (0x00) 03:20:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") prctl$PR_GET_NAME(0x25, &(0x7f00000000c0)=""/227) [ 929.657329][T23596] FAT-fs (loop2): Can't find a valid FAT filesystem 03:20:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") shmctl$SHM_INFO(0x0, 0xe, &(0x7f00000002c0)=""/102) [ 929.751443][T23619] FAT-fs (loop4): bogus number of reserved sectors [ 929.835895][T23619] FAT-fs (loop4): Can't find a valid FAT filesystem 03:20:51 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16, 0xe}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:51 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000780)=0x32, 0x4) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000014, 0x0) 03:20:51 executing program 1: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200026cf7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:51 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b35"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5441, 0x0) [ 930.211080][T23650] FAT-fs (loop4): bogus number of reserved sectors [ 930.262898][T23650] FAT-fs (loop4): Can't find a valid FAT filesystem 03:20:52 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0xbad}, 0x10) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000000200), 0x10, &(0x7f00000002c0)={0x0}}, 0x0) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x16) [ 930.363290][T23649] FAT-fs (loop2): invalid media value (0x2e) [ 930.379873][T23649] FAT-fs (loop2): Can't find a valid FAT filesystem 03:20:52 executing program 1: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200026cf7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:52 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000780)=0x32, 0x4) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000014, 0x0) 03:20:52 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b3532"], 0x1, 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:52 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16, 0x10}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 930.794100][T23682] FAT-fs (loop4): bogus number of reserved sectors [ 930.819353][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 930.825662][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:20:52 executing program 1: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200026cf7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 930.860919][T23682] FAT-fs (loop4): Can't find a valid FAT filesystem 03:20:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:52 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b3532"], 0x1, 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:52 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, 0x0) [ 931.226286][T23701] FAT-fs (loop2): bogus number of reserved sectors 03:20:53 executing program 1: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200026cf7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 931.340139][T23719] FAT-fs (loop4): bogus number of reserved sectors [ 931.347813][T23701] FAT-fs (loop2): Can't find a valid FAT filesystem [ 931.395901][T23719] FAT-fs (loop4): Can't find a valid FAT filesystem 03:20:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x1000000805}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000200)={'vlan0\x00\x00\xf6\xff\xff\xff\xff\xff\xff\xff\x00', {0x2, 0x0, @loopback}}) 03:20:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000080)=ANY=[@ANYBLOB="01000000000000008804"]) 03:20:53 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b3532"], 0x1, 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 931.623437][T23705] FAT-fs (loop2): bogus number of reserved sectors [ 931.655858][T23705] FAT-fs (loop2): Can't find a valid FAT filesystem 03:20:53 executing program 1: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200026cf7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:53 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16, 0x300}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 931.875532][T23746] FAT-fs (loop4): bogus number of reserved sectors [ 931.929593][T23746] FAT-fs (loop4): Can't find a valid FAT filesystem 03:20:53 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) pipe(&(0x7f0000000440)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000780)=0x32, 0x4) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 03:20:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:53 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c80)={{{@in6=@ipv4={[], [], @multicast1}, @in=@initdev}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) ioctl$SIOCSIFMTU(0xffffffffffffffff, 0x8922, 0x0) getgroups(0x0, &(0x7f00000012c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x20, @mcast1, 0x6}, {0xa, 0x4e20, 0x0, @rand_addr="e17caa560ccf429537af76246be417bd", 0x9}, 0xffffffffffffffff, 0x200}}, 0x48) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x7003, 0x0) ioctl$VIDIOC_DQEVENT(0xffffffffffffffff, 0x80885659, 0x0) preadv(r0, &(0x7f0000000280)=[{&(0x7f00000003c0)=""/116, 0x74}], 0x1, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) shmctl$SHM_UNLOCK(0x0, 0xc) r1 = shmget(0x3, 0x1000, 0x1000, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000d80)=""/4096) r2 = socket$inet(0x2, 0x2ee054aa86b5ddfc, 0x200) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f00000000c0)={'security\x00', 0x40, "b03a3d6f91e411e8b74347761705df5b0b0fab8e7db7cb74b4da0a89306f40eead780c790fccdb672d938d80a6c80d9649a87be3fd8cd73a85a3452a7b651599"}, 0x0) setsockopt$inet_dccp_int(r2, 0x21, 0x5, &(0x7f0000000000)=0x8000, 0x4) [ 932.208460][T23764] FAT-fs (loop2): bogus number of reserved sectors [ 932.261944][T23764] FAT-fs (loop2): Can't find a valid FAT filesystem 03:20:54 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b3532"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:54 executing program 1: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200026cf7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 932.418682][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 932.424636][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 932.445776][T23780] FAT-fs (loop4): bogus number of reserved sectors [ 932.491907][T23789] FAT-fs (loop2): bogus number of reserved sectors [ 932.568774][T23780] FAT-fs (loop4): Can't find a valid FAT filesystem [ 932.585875][T23789] FAT-fs (loop2): Can't find a valid FAT filesystem 03:20:54 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16, 0x500}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x0, &(0x7f0000000040), 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 932.738711][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 932.744641][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 932.898695][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 932.905453][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:20:54 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b3532"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:54 executing program 1: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200026cf7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 932.962950][T23807] FAT-fs (loop4): bogus number of reserved sectors [ 932.997444][T23807] FAT-fs (loop4): Can't find a valid FAT filesystem 03:20:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x0, &(0x7f0000000040), 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:54 executing program 0: r0 = epoll_create(0x80001) epoll_wait(r0, &(0x7f00000000c0)=[{}], 0x1, 0x200) [ 933.196961][T23808] FAT-fs (loop2): bogus number of reserved sectors 03:20:54 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c80)={{{@in6=@ipv4={[], [], @multicast1}, @in=@initdev}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) ioctl$SIOCSIFMTU(0xffffffffffffffff, 0x8922, 0x0) getgroups(0x0, &(0x7f00000012c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x20, @mcast1, 0x6}, {0xa, 0x4e20, 0x0, @rand_addr="e17caa560ccf429537af76246be417bd", 0x9}, 0xffffffffffffffff, 0x200}}, 0x48) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x7003, 0x0) ioctl$VIDIOC_DQEVENT(0xffffffffffffffff, 0x80885659, 0x0) preadv(r0, &(0x7f0000000280)=[{&(0x7f00000003c0)=""/116, 0x74}], 0x1, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) shmctl$SHM_UNLOCK(0x0, 0xc) r1 = shmget(0x3, 0x1000, 0x1000, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000d80)=""/4096) r2 = socket$inet(0x2, 0x2ee054aa86b5ddfc, 0x200) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f00000000c0)={'security\x00', 0x40, "b03a3d6f91e411e8b74347761705df5b0b0fab8e7db7cb74b4da0a89306f40eead780c790fccdb672d938d80a6c80d9649a87be3fd8cd73a85a3452a7b651599"}, 0x0) setsockopt$inet_dccp_int(r2, 0x21, 0x5, &(0x7f0000000000)=0x8000, 0x4) [ 933.263819][T23808] FAT-fs (loop2): Can't find a valid FAT filesystem [ 933.404884][T23829] FAT-fs (loop4): bogus number of reserved sectors 03:20:55 executing program 1: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200026cf7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 933.489394][T23829] FAT-fs (loop4): Can't find a valid FAT filesystem 03:20:55 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16, 0x600}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:55 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b3532"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[r2, r1], 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x0, &(0x7f0000000040), 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:55 executing program 1: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200026cf7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 933.921442][T23860] FAT-fs (loop4): bogus number of reserved sectors 03:20:55 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b3532"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 933.973893][T23854] FAT-fs (loop2): bogus number of reserved sectors [ 934.003408][T23860] FAT-fs (loop4): Can't find a valid FAT filesystem [ 934.019280][T23854] FAT-fs (loop2): Can't find a valid FAT filesystem 03:20:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000000301ffff808fdb003d88c8f00010ae1b"], 0x14}}, 0x0) recvmmsg(r0, &(0x7f00000013c0), 0x154, 0x200002, &(0x7f0000000c40)={0x77359400}) 03:20:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{0x0}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:56 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) getpeername(0xffffffffffffff9c, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, 0x0) 03:20:56 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16, 0x700}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 934.444500][T23889] FAT-fs (loop4): bogus number of reserved sectors [ 934.478862][T23889] FAT-fs (loop4): Can't find a valid FAT filesystem 03:20:56 executing program 1: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200026cf7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:56 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b3532"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 03:20:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{0x0}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x20001, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 03:20:56 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b3532"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 934.990595][T23920] FAT-fs (loop4): bogus number of reserved sectors [ 935.005696][T23907] FAT-fs (loop2): bogus number of reserved sectors [ 935.029405][T23920] FAT-fs (loop4): Can't find a valid FAT filesystem 03:20:56 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'mangle\x00'}, 0x0) 03:20:56 executing program 1: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200026cf7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 935.053539][T23907] FAT-fs (loop2): Can't find a valid FAT filesystem 03:20:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{0x0}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:56 executing program 0: shmget(0x3, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) 03:20:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) [ 935.316991][T23942] FAT-fs (loop2): bogus number of reserved sectors [ 935.457964][T23948] FAT-fs (loop4): bogus number of reserved sectors [ 935.470137][T23942] FAT-fs (loop2): Can't find a valid FAT filesystem [ 935.496878][T23948] FAT-fs (loop4): Can't find a valid FAT filesystem 03:20:57 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16, 0xa00}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:57 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b3532"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2], 0x1) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:57 executing program 0: r0 = memfd_create(&(0x7f0000000080)='#em1#+\x00', 0x0) write$eventfd(r0, &(0x7f0000000240)=0x20000000000080, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) openat$zero(0xffffffffffffff9c, 0x0, 0x200000, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x264, &(0x7f0000000000)=[{}]}, 0x10) 03:20:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, 0x0, 0x0) 03:20:57 executing program 1: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getpgid(0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401000200026cf7f8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 935.929570][T23973] FAT-fs (loop4): bogus number of reserved sectors [ 935.969221][T23973] FAT-fs (loop4): Can't find a valid FAT filesystem [ 936.174426][T18347] ================================================================== [ 936.182807][T18347] BUG: KASAN: use-after-free in blk_mq_free_rqs+0x49f/0x4b0 [ 936.190116][T18347] Read of size 8 at addr ffff88821923e250 by task kworker/0:2/18347 [ 936.198101][T18347] [ 936.200454][T18347] CPU: 0 PID: 18347 Comm: kworker/0:2 Not tainted 5.2.0-rc3-next-20190607 #11 [ 936.209302][T18347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 936.219407][T18347] Workqueue: events __blk_release_queue [ 936.224966][T18347] Call Trace: [ 936.228273][T18347] dump_stack+0x172/0x1f0 [ 936.232630][T18347] ? blk_mq_free_rqs+0x49f/0x4b0 [ 936.237614][T18347] print_address_description.cold+0xd4/0x306 [ 936.243618][T18347] ? blk_mq_free_rqs+0x49f/0x4b0 [ 936.248577][T18347] ? blk_mq_free_rqs+0x49f/0x4b0 [ 936.253533][T18347] __kasan_report.cold+0x1b/0x36 [ 936.258498][T18347] ? blk_mq_free_rqs+0x49f/0x4b0 [ 936.263467][T18347] kasan_report+0x12/0x20 [ 936.267833][T18347] __asan_report_load8_noabort+0x14/0x20 [ 936.273483][T18347] blk_mq_free_rqs+0x49f/0x4b0 [ 936.278265][T18347] ? dd_exit_queue+0x92/0xd0 [ 936.282885][T18347] ? kfree+0x1ec/0x2a0 [ 936.287078][T18347] blk_mq_sched_tags_teardown+0x126/0x210 [ 936.292823][T18347] ? dd_request_merge+0x230/0x230 [ 936.297877][T18347] blk_mq_exit_sched+0x1fa/0x2d0 [ 936.302840][T18347] elevator_exit+0x70/0xa0 [ 936.307273][T18347] __blk_release_queue+0x127/0x330 [ 936.312403][T18347] process_one_work+0x989/0x1790 [ 936.317371][T18347] ? pwq_dec_nr_in_flight+0x320/0x320 [ 936.322758][T18347] ? lock_acquire+0x16f/0x3f0 [ 936.327461][T18347] worker_thread+0x98/0xe40 [ 936.331980][T18347] ? trace_hardirqs_on+0x67/0x220 [ 936.337027][T18347] kthread+0x354/0x420 [ 936.341141][T18347] ? process_one_work+0x1790/0x1790 [ 936.346352][T18347] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 936.352618][T18347] ret_from_fork+0x24/0x30 [ 936.357052][T18347] [ 936.359397][T18347] Allocated by task 1: [ 936.363481][T18347] save_stack+0x23/0x90 [ 936.367649][T18347] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 936.373332][T18347] kasan_kmalloc+0x9/0x10 [ 936.377862][T18347] kmem_cache_alloc_trace+0x151/0x750 [ 936.383251][T18347] loop_add+0x51/0x8d0 [ 936.387351][T18347] loop_init+0x1fe/0x25a [ 936.391613][T18347] do_one_initcall+0x107/0x7ba [ 936.396402][T18347] kernel_init_freeable+0x4d4/0x5c3 [ 936.401803][T18347] kernel_init+0x12/0x1c5 [ 936.406156][T18347] ret_from_fork+0x24/0x30 [ 936.410570][T18347] [ 936.412901][T18347] Freed by task 23980: [ 936.416984][T18347] save_stack+0x23/0x90 [ 936.421157][T18347] __kasan_slab_free+0x102/0x150 [ 936.426137][T18347] kasan_slab_free+0xe/0x10 [ 936.430660][T18347] kfree+0x106/0x2a0 [ 936.434575][T18347] loop_remove+0xa1/0xd0 [ 936.438854][T18347] loop_control_ioctl+0x320/0x360 [ 936.443889][T18347] do_vfs_ioctl+0xdb6/0x13e0 [ 936.448494][T18347] ksys_ioctl+0xab/0xd0 [ 936.452654][T18347] __x64_sys_ioctl+0x73/0xb0 [ 936.457264][T18347] do_syscall_64+0xfd/0x680 [ 936.461790][T18347] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 936.467687][T18347] [ 936.470028][T18347] The buggy address belongs to the object at ffff88821923e040 [ 936.470028][T18347] which belongs to the cache kmalloc-1k of size 1024 [ 936.484095][T18347] The buggy address is located 528 bytes inside of [ 936.484095][T18347] 1024-byte region [ffff88821923e040, ffff88821923e440) [ 936.497487][T18347] The buggy address belongs to the page: [ 936.503144][T18347] page:ffffea0008648f80 refcount:1 mapcount:0 mapping:ffff8880aa400ac0 index:0x0 compound_mapcount: 0 [ 936.514096][T18347] flags: 0x6fffc0000010200(slab|head) [ 936.519597][T18347] raw: 06fffc0000010200 ffffea0008653208 ffffea000864aa08 ffff8880aa400ac0 [ 936.528207][T18347] raw: 0000000000000000 ffff88821923e040 0000000100000007 0000000000000000 [ 936.536801][T18347] page dumped because: kasan: bad access detected [ 936.543223][T18347] [ 936.545557][T18347] Memory state around the buggy address: [ 936.551202][T18347] ffff88821923e100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 936.559278][T18347] ffff88821923e180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 936.567356][T18347] >ffff88821923e200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb 03:20:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") syz_open_dev$amidi(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x2) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 936.575422][T18347] ^ [ 936.582106][T18347] ffff88821923e280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 936.590182][T18347] ffff88821923e300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 936.598256][T18347] ================================================================== [ 936.606324][T18347] Disabling lock debugging due to kernel taint 03:20:58 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x26}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 03:20:58 executing program 3: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="040900f8865fb080d86a438ddd628f875c7046620d64fc41626b0cbb39425547637bb7eb34c2842e37b896ba957a1f0566235ffaec4a4c0b30dcf1ae98251a91ccfc53900182daa60900b4bafe4e4eeef6950c3d5863289e458b2f76a3d24c46b2f334d1b193a9c88008345d25f1fe899f1e487c48731fbd9cf63b3532"], 0x1, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r2], 0x1) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:20:58 executing program 2: syz_open_dev$loop(0x0, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000300)) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0400"], 0x1, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16, 0xe00}], 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x61, &(0x7f00000001c0)="70b41efd3f2a0d3fb51b01fc11a8b6f59ce83b712f626a713492470685cccd01a0dba87772bc8d51eac4af29b9286e7a03ac7fb4430620535a98fe1653140bb0c95145b0f2a93a0620752d009d413bb9ffe19e47610f525c5ba9a8dc6693a933c8"}) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 936.709071][T18347] Kernel panic - not syncing: panic_on_warn set ... [ 936.711715][T23986] kobject: 'loop1' (0000000039915af5): kobject_uevent_env [ 936.715813][T18347] CPU: 0 PID: 18347 Comm: kworker/0:2 Tainted: G B 5.2.0-rc3-next-20190607 #11 [ 936.715821][T18347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 936.715843][T18347] Workqueue: events __blk_release_queue [ 936.715850][T18347] Call Trace: [ 936.715877][T18347] dump_stack+0x172/0x1f0 [ 936.724879][T23986] kobject: 'loop1' (0000000039915af5): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 936.733240][T18347] panic+0x2cb/0x744 [ 936.733253][T18347] ? __warn_printk+0xf3/0xf3 [ 936.733270][T18347] ? blk_mq_free_rqs+0x49f/0x4b0 [ 936.733283][T18347] ? preempt_schedule+0x4b/0x60 [ 936.733297][T18347] ? ___preempt_schedule+0x16/0x18 [ 936.733311][T18347] ? trace_hardirqs_on+0x5e/0x220 [ 936.733326][T18347] ? blk_mq_free_rqs+0x49f/0x4b0 [ 936.733341][T18347] end_report+0x47/0x4f [ 936.733352][T18347] ? blk_mq_free_rqs+0x49f/0x4b0 [ 936.733362][T18347] __kasan_report.cold+0xe/0x36 [ 936.733376][T18347] ? blk_mq_free_rqs+0x49f/0x4b0 [ 936.733391][T18347] kasan_report+0x12/0x20 [ 936.733406][T18347] __asan_report_load8_noabort+0x14/0x20 [ 936.733418][T18347] blk_mq_free_rqs+0x49f/0x4b0 [ 936.733431][T18347] ? dd_exit_queue+0x92/0xd0 [ 936.733441][T18347] ? kfree+0x1ec/0x2a0 [ 936.733462][T18347] blk_mq_sched_tags_teardown+0x126/0x210 [ 936.733476][T18347] ? dd_request_merge+0x230/0x230 [ 936.733488][T18347] blk_mq_exit_sched+0x1fa/0x2d0 [ 936.733504][T18347] elevator_exit+0x70/0xa0 [ 936.733521][T18347] __blk_release_queue+0x127/0x330 [ 936.733537][T18347] process_one_work+0x989/0x1790 [ 936.733555][T18347] ? pwq_dec_nr_in_flight+0x320/0x320 [ 936.733567][T18347] ? lock_acquire+0x16f/0x3f0 [ 936.733586][T18347] worker_thread+0x98/0xe40 [ 936.733599][T18347] ? trace_hardirqs_on+0x67/0x220 [ 936.733618][T18347] kthread+0x354/0x420 [ 936.733631][T18347] ? process_one_work+0x1790/0x1790 [ 936.733644][T18347] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 936.733660][T18347] ret_from_fork+0x24/0x30 [ 936.735057][T18347] Kernel Offset: disabled [ 936.917313][T18347] Rebooting in 86400 seconds..