x0, 0x0, 0x4000}, 0x40000) tkill(r2, 0x37) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 07:03:33 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000580)=0xc) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{0x0}], 0x4000, &(0x7f00000007c0)={[], [{@obj_role={'obj_role', 0x3d, '/dev/video0\x00'}}, {@obj_role={'obj_role', 0x3d, '!user'}}, {@measure='measure'}]}) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000640)={'broute\x00', 0x0, 0x3, 0xd6, [], 0x5, &(0x7f00000000c0)=[{}, {}, {}, {}, {}], &(0x7f0000000a40)=""/214}, &(0x7f0000000040)=0x78) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:03:33 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x8100, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:03:33 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r0, 0xc040564a, &(0x7f0000000000)={0x3, 0x3, 0x1013, 0x0, 0x5, 0x0, 0x1}) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x9, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f00000001c0)) 07:03:33 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 948.544741] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 948.561602] FAT-fs (loop5): Filesystem has been set read-only [ 948.587062] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 948.651563] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 948.679109] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 07:03:36 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:03:36 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000280)={0xa, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:03:36 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x1662, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:03:36 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x101482, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000140)={0x8000000000000, 0x0, 'client1\x00', 0x4, "d72cfcacefdeee8a", "ab061743cbb6e611630805a576556edfb66f42b3518ac099b18c340b2f1e404b", 0x200, 0x4}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)="603d059fe27bdce587cd3e136ed4c0650ab49daf1307e6d3547decec58f4abec2e5270919474c1c2944d34033a79c5cdbba822") ptrace$cont(0x1f, r0, 0x0, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f0000000200)=""/125) 07:03:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000580)=0xc) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{0x0}], 0x4000, &(0x7f00000007c0)={[], [{@obj_role={'obj_role', 0x3d, '/dev/video0\x00'}}, {@obj_role={'obj_role', 0x3d, '!user'}}, {@measure='measure'}]}) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) chroot(&(0x7f0000000040)='./file0\x00') ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:03:36 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x12, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)=0x0) write$cgroup_pid(r1, &(0x7f0000000140)=r2, 0x12) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x37) ptrace$cont(0x18, r3, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r3, 0x0, 0x0) 07:03:36 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000180)={0x9, @sliced={0x6, [0x18, 0x213c12dc0000, 0x8, 0x100, 0x8001, 0xfffffffffffffff8, 0x2, 0x8000, 0x6382a2b7, 0xffffffffffff4f5d, 0x0, 0x6, 0x401, 0x0, 0x1f, 0x5, 0x8, 0x1000, 0x3, 0x6, 0x4, 0x7, 0x7, 0x1000, 0x1, 0x100000000, 0x2, 0x9, 0x200, 0x1, 0xd2d, 0x100000001, 0x4, 0x7aa, 0x80000001, 0x7ff, 0x2, 0x8, 0x4, 0x8, 0x5, 0x7, 0x3, 0x3, 0xffffffff, 0xffffffff, 0x80000000, 0x8], 0x7fffffff}}) [ 951.071012] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 951.100283] FAT-fs (loop5): Filesystem has been set read-only [ 951.150405] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 951.201758] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) [ 951.202625] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:03:36 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x20000200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) wait4(0x0, 0x0, 0x84000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x37) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 07:03:36 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:03:36 executing program 4: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x2000, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f0000000180)={0x9, "6034ec6973c7811368788f470ae084c310776e91edcd7efbed1e483b1383e13f", 0x5, 0x80, 0x400, 0x5, 0x1, 0x0, 0x1, 0x2}) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000080)={0x9, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:03:36 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x8000000002f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 07:03:36 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x10b, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:03:36 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x9, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x100000000, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000180)={0x2a, 0x29, 0x2, {0x3ff, [{{0x4, 0x2}, 0x2, 0x81, 0x7, './file0'}]}}, 0x2a) 07:03:36 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:03:36 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x9, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) r1 = getpgrp(0xffffffffffffffff) ptrace(0x8, r1) 07:03:36 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 07:03:37 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x40, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000640)="08adca61fc5a4e56fd61b612aadf693e0653342b450c1bc95b8b34c57828633f202692fbeee5db3c1a89c770269f6e79a8dd6e32ab637861ddc3b86beae1e1a6e86fff2adf7d74e1e1e7ecfc328e947eec4c5dfbe4880d37a12bb5d38e8458602ea15b9861dc20f361cac5e3fe0b83", &(0x7f0000000a40)="adb20c4185f48f7f5c7cc286a33cdfd8db0c7e9cfaba3a51e4bf32bec69e29ee71effd78c134bcfed7d9bf2eb23c5e9cc216b74adf1762012bf5a6fe26d93de853d3707e8061759edefdf9372857", 0x1}, 0x20) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], 0x195) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r3, &(0x7f0000000480)) ioctl$KVM_GET_EMULATED_CPUID(r1, 0xc008ae09, 0x0) getuid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x5) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000580)=0xc) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000980)) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{0x0}], 0x4000, &(0x7f00000007c0)={[], [{@obj_role={'obj_role', 0x3d, '/dev/video0\x00'}}, {@obj_role={'obj_role', 0x3d, '!user'}}, {@measure='measure'}]}) r4 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000001580)="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", 0x1000, 0xfffffffffffffffe) r5 = add_key(&(0x7f00000006c0)='cifs.idmap\x00', &(0x7f0000000880)={'syz', 0x3}, &(0x7f00000008c0)="0a1da12968863f980d48d9c3feaa1acd1bf001db1cd425dac3c0713e34248f73cce20418bfc958405d89ba2e47fc0662a3012536504832ef8fb9fbfef63b7fd511eb72c3d91e141e174e0e81c879b24349193cb184fab2a91a78d3e4f10cab8978647546512fa8cdffb2e2dd5f63b9ae288bd8d221789c68dc251d8a537ba233e3f388deb6981fa84818ecf7552ad36c4364d30c8f9ce41077", 0x99, 0xfffffffffffffffd) keyctl$instantiate(0xc, r4, &(0x7f00000005c0)=@encrypted_update={'update ', 'ecryptfs', 0x20, 'user:', '!user'}, 0x1b, r5) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:03:37 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 07:03:37 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x80000000, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x9, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:03:37 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4209, r1, 0x15, 0xfffffffffffffffc) tkill(r1, 0x37) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) r2 = semget(0x2, 0x3, 0x0) semctl$GETVAL(r2, 0x0, 0xc, &(0x7f0000000140)=""/70) 07:03:37 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) write$P9_RSTAT(r0, &(0x7f0000000280)=ANY=[], 0x10) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000240)=0x7fff) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000200)=0x8) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000080)={0x9, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 07:03:37 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) [ 952.325498] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) [ 952.333435] FAT-fs (loop5): Filesystem has been set read-only 07:03:39 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x9, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x200202, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000180)={'vlan0\x00', 0x3}) 07:03:39 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x87) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x37) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 07:03:39 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = dup(0xffffffffffffffff) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) 07:03:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() capget(&(0x7f0000000000)={0x20080522, r0}, &(0x7f0000000080)={0x912c, 0x4, 0x40000000000, 0x7, 0x800, 0xb476}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 07:03:39 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x5f07000000000000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:03:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/mixer\x00', 0x80000, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000007c0)=0x1d) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2000, 0x0) fchdir(r1) getpeername$unix(r0, &(0x7f0000001180), &(0x7f0000001200)=0x6e) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000040)=0x0) fcntl$setown(r1, 0x8, r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="0000ea2739cda39b714c24e562713c2d0d885c6726f4f60cde4f666657a6d6c34ac4580235be4ef935665803045e77b8444d7d000000000000ba548ae0f8991690c58ab2484d6c37cd6f02e925cbfa08aecc7cde9ca69c88b70a293082dcfa7b523ca6291d27b3f89dac02841e76ca57209068505222ac7806fdbd9961120c28aa23a8d6ae35c15b559bf2556539af6ce8e7aa439272d1e5fcf4d5dbd9cdd2e172aa1ed800d3248586eab7008418a9b803ef585f48fdff9c9f6315b7dc85d76a532a992b41d73b8ae0e893c8eed0c2b2e6c2a2cda843b23d8021625a62d2ebb4a3ec7930a37266bc1c441f92b04a0a5ebc07b25f886a6a204a4431081879bc06fe6a8c99a6879b171ad1c4c3bacd42d9712588f49861549b8519e1ff234a761c5a4844d63b93c68da6ce71dfc8f4acfaa23ed29b4456c553b2004df1e36a0ef2ecfb7291c1d9811f4039acb6a3786ff09ed092de1ff886c89de3ce949279fcd86fdf29ef39e5533a02d64f3ea9da6b6cd022c5f30dd125a6d05e2b8a8184b1a178a58deff233e9d3b7b895b63c6a885ae19d4189f5"], 0x195) r4 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') ioctl$VIDIOC_REQBUFS(r3, 0xc0145608, &(0x7f0000000240)={0x6ec7c895, 0xb, 0x7}) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r4, &(0x7f0000000480)) ioctl$KVM_GET_EMULATED_CPUID(r1, 0xc008ae09, 0x0) getuid() getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000580)=0xc) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{0x0}], 0x4000, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0x7, &(0x7f0000001000)=[{&(0x7f0000000180)="e20ff57df54549569a698c770959a277a8500b64", 0x14, 0xffffffffffffffff}, {&(0x7f0000000640)="b7799b36267985c923e05fdc75339b46c8115c41866eed995affd76b82cb54c236aa3f9b0ec40e099d5978ad53b018619bb8646d9a2fc270cc20ac6eedc59fbbb7c3c47fd2c9c1db55a7459f7ecfe24b884f27fa572091a860d4da70d3fb7bcf98db67ea994c068b6fdd43649a69d22924e97e7e745524631cda0f9d6a3eb94051005ac709b5bc2fce8ee6caf57fe15b75fa2e", 0x93, 0xff}, {&(0x7f0000000bc0)="c0164c77ae4c02de365b6ae7636fd7376bb085d7d1130b6d87abe8afdddf9872b8fca3390692cab7955ad89509840559f7f08ecc8c42ac1ce5be44c73604ac64e471605df79f7a2f1478eea50f2e9b071cf044adfe79cd89d2670ec6c2a66913178a1d3274ec13be74e6e948ffb42d59642f1cff436000c3e33848b4e5a9ace7168ccb071a73bba16df77f6cca6e8526a94ce5e440830f203334f0cd85615a3b9c0773cdd2795696d7d503d54aa1c1395fbd7e6f", 0xb4}, {&(0x7f0000000c80)="cd145759b8c98663cf185609b4e3d8bbc7278bf91d0966ea2909d2472bd36c9816d12da23a81fd0e4f0ebc72c1cf214826fc6bb0872ea42d03528d880b4c338569c1c4f23cda5d1624d8e5d9ea38ec2e8e46a2fa194db24fc425e9bdc30cefa9cf8e5f2e1cec0a81f3b21ca46d090b112a9fd101be4001f879c161591a9fb79aca97c3020fac65713636c6b394f9ebd783861183e7a50a5ac56b2de0305482548188675574be4e1340a5455020d9f96da1d95113dba421db759be2e46fa3330074fad6a2f1a03fb7dd5be16e48fb87bc", 0xd0, 0x6}, {&(0x7f0000000d80)="1e5c17e3cafaa0e5fec04bfa401a341b93743c2497f23029b2e612cfb8f5a5287e7d2775f0ffe6e23a3f6e640d6f0e295135e9d856f4c78989f3ad7333ceeb64cd2be175988f23d17216c6fef77ce95e2820d4496d56efe176366f4adaf5ea995eaa08722a0df092911547a8da9d4dcd5fe5c6160c5ad50d", 0x78, 0x6b}, {&(0x7f0000000e00)="9e7400df300bc9948e622112ce14c981e8a08dd4570f137a18add2c4c885be33a6dd309b18c32e6f2d05af6e6bfdf94249791b2862d05be768587d8ef78f8ec0e63064e23db4e201d7ab57c544fdf18108116e0c168bbf69b7f1609ec0244325e454b0b3d8ccc2a94a8172c3ccd7485be107659a7ac97bc909f8ff3099e22f0c441f08fe5407404ff2367f0c12f657d516fb9213df728f8b0defe7015c0b78c892ee0aae69593eef", 0xa8, 0x200}, {&(0x7f0000000f00)="693a3465e5d02a39f39cbd719f2a299595ea9c392c0f3d6f9c5a5a495bb66be89e9c160587a33e3c844b25a0c8ce4269a4e369a18be0aefb97ca8576fc5d6731235f0902e3f367dcb609e2395acb3d9c059564101aa5da23326abf2ef76f8cc1f57db4c309c790bc195c3e1c34fef38abae8b8a8c3a82a4b454f0c45c6940d42634ff26a3a0b556b99b5369c102bfc94d70127749655c5a92d4aba6854a5b398cb094f1a29e370487aa67013f64db6a6f2cf311805348ef8161f7c8acba637d801f81ebce4deec481b833003cdcfc11c4260803932634560cdfa0fddfe5365420ad39cf840dfc4d503ba67b11c511d4143dcc2", 0xf3, 0x5040}], 0x100000, &(0x7f00000010c0)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}], [{@subj_type={'subj_type', 0x3d, '/dev/video0\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/dev/video0\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'eth0[mime_type'}}, {@euid_lt={'euid<', r5}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}]}) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:03:39 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x9, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) r1 = dup2(r0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, &(0x7f0000000000)={0x9df3, "40b4d7566c769c156216f0636831088175f875ab7d6a9d8de034d10fd4f290bf", 0x1}) 07:03:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0xe5}) ptrace$setregs(0xd, r0, 0x1, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 07:03:39 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x37) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) r2 = shmget$private(0x0, 0x2000, 0x908, &(0x7f0000ffd000/0x2000)=nil) shmctl$IPC_RMID(r2, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 07:03:39 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = dup(0xffffffffffffffff) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) 07:03:39 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x3070000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:03:39 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x9, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8c2, 0x60400) getpeername$packet(0xffffffffffffffff, &(0x7f0000001200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001240)=0x14) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000001280)=r2) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendto(r3, &(0x7f0000000180)="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", 0x1000, 0x8001, &(0x7f0000001180)=@vsock={0x28, 0x0, 0x2710, @my=0x0}, 0x80) 07:03:39 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = dup(0xffffffffffffffff) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) 07:03:40 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x37) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x2, 0x4000) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000080)={0xfffffffffffffffd, 'veth1_to_bridge\x00', 0x2000}, 0x18) ptrace$cont(0x1f, r1, 0x0, 0x0) 07:03:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000000140)={0xf18, 0x80000000, 0x7fff, 0x0, 0x85f, 0x8}) 07:03:40 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:03:40 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x4002) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f00000001c0)=0x2) setsockopt$inet_mreq(r1, 0x0, 0x0, &(0x7f0000000180)={@dev={0xac, 0x14, 0x14, 0x10}, @broadcast}, 0x8) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x9, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f0000000200)="b746bafd13626c4b8480e2f660cdfd5d67e1f70c9ece343bab133002c643fdd2ca1ed1ca540d0dd095863d67f38b93356d3f56b14c5ff7147f476aab65bc57e1fdc90c8f7607a98538562a87a0e230ca33ac46b3f194702f2be40e9b86f38a5120c0eb4311cbf21ebebc6652b0055c199ef90c9040eaa804196dd23819338c4be3bc1812ae1ad6addcc45a4fc84661d873485cad4aa37623dc993720d6ec546daedb69da0026ac113a41d527971d23842c3e79748743bb8d66d73aa2d757542b29737636e84178012f796ce7a5078c7fc8728ce6d01cde0cbbe386a3f229920fa5f24f1ad844") [ 954.939700] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 954.950293] FAT-fs (loop5): Filesystem has been set read-only [ 955.043346] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 955.108390] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 955.124548] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 07:03:40 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:03:40 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(r1, 0x0, 0x81000002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000180)=0xfffffffffffffffd) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x37) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$RTC_EPOCH_READ(r2, 0x8008700d, &(0x7f0000000140)) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 07:03:40 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x9, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r1, 0x5406, 0x7ffffb) exit_group(0x3) 07:03:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) getuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000580)=0xc) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{0x0}], 0x4000, &(0x7f00000007c0)={[], [{@obj_role={'obj_role', 0x3d, '/dev/video0\x00'}}, {@obj_role={'obj_role', 0x3d, '!user'}}, {@measure='measure'}]}) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:03:40 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xc608000000000000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:03:40 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x400100, 0x0) mq_timedsend(r1, &(0x7f0000000180)="38088c9f965fd1a723fe4b667d56ec364513b3d459e9174c2bdee553f9831a5efc39392b332937323b", 0x29, 0x9, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x9, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f00000001c0)={0x0, 0x3}) 07:03:40 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x40000048000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x20037) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x100000001, 0x400) faccessat(r2, &(0x7f0000000080)='./file0\x00', 0xe, 0xb00) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ioctl$DRM_IOCTL_RM_MAP(r2, 0x4028641b, &(0x7f0000000140)={&(0x7f0000ffc000/0x4000)=nil, 0x0, 0x2, 0x11, &(0x7f0000ffe000/0x2000)=nil, 0x10000}) ptrace$cont(0x1f, r1, 0x0, 0x0) getpid() 07:03:40 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:03:40 executing program 4: prctl$PR_GET_KEEPCAPS(0x7) r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x9, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:03:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x180, 0x11) tkill(r1, 0x37) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="73797a31849646201a25d65459a30cb0b806c2fc5354b26d201cb73f68b665204f802d0ce47f7107329041b1368ca4b6b80400000042e2a7e9"], 0x39) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 07:03:43 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="0000ea2739cda39b714c24e562713c2d0d885c6726f4f60cde4f666657a6d6c34ac4580235be4ef935665803045e77b8444d7d000000000000ba548ae0f8991690c58ab2484d6c37cd6f02e925cbfa08aecc7cde9ca69c88b70a293082dcfa7b523ca6291d27b3f89dac02841e76ca57209068505222ac7806fdbd9961120c28aa23a8d6ae35c15b559bf2556539af6ce8e7aa439272d1e5fcf4d5dbd9cdd2e172aa1ed800d3242ff7eab7008418a9b803ef585f48fdff9c9f6315b7dc85d76a532a992b41d73b8ae0e893c8eed0c2b2e6c2a2cda843b23d8021625a62d2ebb4a3ec7930a37266bc1c441f92b04a0a5ebc07b25f886a6a204a4431081879bc06fe6a8c99a6879b171ad1c4c3bacd42d9712588f49861549b8519e1ff234a761c5a4844d63b93c68da6ce71dfc8f4acfaa23ed29b4456c553b2004df1e36a0ef2ecfb7291c1d9811f4039acb6a3786ff09ed092de1ff886c89de3ce949279fcd86fdf29ef39e5533a02d64f3ea9da6b6cd022c5f30db625a6d05e2b8a8184b1a178a58deff233e9d3b7b895b63c6a885ae19d4189f5"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x5300, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:03:43 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x82000) prctl$PR_SET_FP_MODE(0x2d, 0x2) syz_open_dev$sndpcmp(&(0x7f0000000340)='/dev/snd/pcmC#D#p\x00', 0x7, 0x80) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x501102, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000001c0)) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f00000002c0)={'filter\x00', 0x0, 0x0, 0x0, [], 0x0, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, 0x78) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x9, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:03:43 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = dup3(r1, r1, 0x80000) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, &(0x7f0000000140)={{0xb7, @broadcast, 0x4e22, 0x2, 'rr\x00', 0x10, 0xffffffff, 0x3}, {@loopback, 0x4e22, 0x10000, 0xfffffffffffffff9, 0x5, 0x3}}, 0x44) ptrace$pokeuser(0x6, r2, 0x6, 0x7) wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x37) ptrace$cont(0x9, r2, 0x1, 0x4000000000) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000000)={'lo\x00', 0x200}) ptrace$cont(0x1f, r2, 0x0, 0x0) 07:03:43 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:03:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="0000ea2739cda39b714c24e562713c2d0d885c6726f4f60cde4f666657a6d6c34ac4580235be4ef935665803045e77b8444d7d000000000000ba548ae0f8991690c58ab2484d6c37cd6f02e925cbfa08aecc7cde9ca69c88b70a293082dcfa7b523ca6291d27b3f89dac02841e76ca57209068505222ac7806fdbd9961120c28aa23a8d6ae35c15b559bf2556539af6ce8e7aa439272d1e5fcf4d5dbd9cdd2e172aa1ed800d3242ff7eab7008418a9b803ef585f48fdff9c9f6315b7dc85d76a532a992b41d73b8ae0e893c8eed0c2b2e6c2a2cda843b23d8021625a62d2ebb4a3ec7930a37266bc1c441f92b04a0a5ebc07b25f886a6a204a4431081879bc06fe6a8c99a6879b171ad1c4c3bacd42d9712588f49861549b8519e1ff234a761c5a4844d63b93c68da6ce71dfc8f4acfaa23ed29b4456c553b2004df1e36a0ef2ecfb7291c1d9811f4039acb6a3786ff09ed092de1ff886c89de3ce949279fcd86fdf29ef39e5533a02d64f3ea9da6b6cd022c5f30db625a6d05e2b8a8184b1a178a58deff233e9d3b7b895b63c6a885ae19d4189f5"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000580)=0xc) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{0x0}], 0x4000, &(0x7f00000007c0)={[], [{@obj_role={'obj_role', 0x3d, '/dev/video0\x00'}}, {@obj_role={'obj_role', 0x3d, '!user'}}, {@measure='measure'}]}) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000b00)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:03:43 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x220200, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0x101, @empty, 0x3}, @in6={0xa, 0x4e23, 0x1, @local, 0x3}], 0x38) r1 = syz_open_dev$video(&(0x7f0000000200)='/dev/video#\x00', 0x3, 0xa102) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000080)={0x9, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) [ 957.986364] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 958.019711] FAT-fs (loop5): Filesystem has been set read-only 07:03:43 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:03:43 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x37) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000080)={0x0, 0x80000}) r5 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0xdb, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r5, 0x80045301, &(0x7f0000000200)) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x80, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r3, 0xc00c642d, &(0x7f0000000180)={r4, 0x80000, r6}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 07:03:43 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1, 0x201) ioctl$VIDIOC_S_HW_FREQ_SEEK(r0, 0x40305652, &(0x7f0000000000)={0xfff, 0x1, 0x0, 0x3ff, 0x3, 0x40, 0x1}) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000180)={0x2, 0x5, 0x0, "81681d01ef7e7ca31e1ca74fd1db432fb53f62f0acd4a06fe8605f0ba348e663", 0x38415262}) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x9, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) [ 958.056173] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 958.093186] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 958.153933] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 07:03:43 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="0000ea2739cda39b714c24e562713c2d0d885c6726f4f60cde4f666657a6d6c34ac4580235be4ef935665803045e77b8444d7d000000000000ba548ae0f8991690c58ab2484d6c37cd6f02e925cbfa08aecc7cde9ca69c88b70a293082dcfa7b523ca6291d27b3f89dac02841e76ca57209068505222ac7806fdbd9961120c28aa23a8d6ae35c15b559bf2556539af6ce8e7aa439272d1e5fcf4d5dbd9cdd2e172aa1ed800d3242ff7eab7008418a9b803ef585f48fdff9c9f6315b7dc85d76a532a992b41d73b8ae0e893c8eed0c2b2e6c2a2cda843b23d8021625a62d2ebb4a3ec7930a37266bc1c441f92b04a0a5ebc07b25f886a6a204a4431081879bc06fe6a8c99a6879b171ad1c4c3bacd42d9712588f49861549b8519e1ff234a761c5a4844d63b93c68da6ce71dfc8f4acfaa23ed29b4456c553b2004df1e36a0ef2ecfb7291c1d9811f4039acb6a3786ff09ed092de1ff886c89de3ce949279fcd86fdf29ef39e5533a02d64f3ea9da6b6cd022c5f30db625a6d05e2b8a8184b1a178a58deff233e9d3b7b895b63c6a885ae19d4189f5"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x9858, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:03:43 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x9, 0x800000000000000) r1 = syz_open_pts(0xffffffffffffffff, 0x4001) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000000)="2ef829ad18c604206fde9affffbf5fb00d4c0dc3f83c932990eb75e9ba465cea8586f239353f816be6c37670e83cb3bfd3124114") ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x9, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) [ 958.454681] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 958.463677] FAT-fs (loop5): Filesystem has been set read-only [ 958.504924] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 958.558029] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 958.573779] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 07:03:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000080)) wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x37) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) uselib(&(0x7f0000000000)='./file0\x00') ptrace$cont(0x1f, 0x0, 0x0, 0x0) 07:03:46 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:03:46 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x37) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0xfffffffffffffffc, 0x0, 0x0, 0x4, 0x31}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x301000, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 07:03:46 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:03:46 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xf00b0000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:03:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r2, r1, &(0x7f0000000000)=0x2, 0x808100000002) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f00000000c0)='./bus\x00', 0x1f, 0x1, &(0x7f0000000100)=[{&(0x7f0000000a40)="25fd442898ab3a5be4be72d3698d7484dc77365634c726402c804d3ccbdbe80248fe4c14089c11e1eb530cf2f88aef2efd0f193a386bc3509519cc9ede5bf29e6bbf3995a7ec1151da41b76f2cc9fe65a39d592eaf4ff34e27cb7e027312058003d0030d1e8a17f74a0c11613a896d2ece4d3c3f5b70c8735361ef3c24412f708dbd9b278c75583bd811db779124ddd5a998900f15df480a4676925271392171d384ee31893ca52fd8bab2543cad203fedfa6e43c9db7a43c00f572672fe36181b8c419611", 0xc5, 0x2}], 0x10, &(0x7f0000000b40)=ANY=[@ANYBLOB='nouser_xattr,user_xattr,nouser_xattr,nouser_xattr,fowner<', @ANYRESDEC=r3, @ANYBLOB="2c006b8d3bfe90697fa0dcaafad799c2bc37341e2ec3f300a6fa286d991a9de6df31f8d6fa26c6d9d4ebd847a9d1578a0797ccf9cd908cf2c670b4c408f6b88278f59433129925f0449173b31229053468bc005de76f2311b89b44a957a07ce72b04c143711075827aa2a1057f1ade5cf026093b6cfe383c54fe80d695074ff800c6244536bc2fd4fe77d3ae745f083be99c1ee7115a4fce8171e33b8e193ae45ec87b1a5378cf1ff603c000cc379d08cf2406a197d5197d94f924c6f161b3d0cfffd4d56cf53dc2dd04170eddd31afab2916f69bd4fd5965b61ffd731738ca45eea448847f0b1d952ecf9a61ff3bf8921b96ce9af78142421f1e5cf734fb1a1161e334fe1294db64b17caa2ea632c4013a337a11829d289edfc89a7920b7948dad20d13a8305e7a9880f58924de266e754f5afd1a9d4cfc9e939a105188ac0e15071abd0163c2025fd6654cb559e60774184258a9eb70eba50a4b9d2ef47f82687bf47950de97ed0aa184"]) ioctl$KVM_GET_EMULATED_CPUID(r1, 0xc008ae09, 0x0) getuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000580)=0xc) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0xfffffffffffffffd) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{0x0}], 0x4000, &(0x7f00000007c0)=ANY=[@ANYBLOB='mbj_role=/dev-video0\x00,obj_role=!user,measure,\x00']) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:03:46 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r1 = dup(r0) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(0xffffffffffffffff) 07:03:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x8080) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000080)={0xe1, 0x2ca, 0x2, 0x0, 0x10001, 0x1f}) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000140)=0x6) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 961.088122] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 961.160753] FAT-fs (loop5): Filesystem has been set read-only [ 961.188693] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 961.199263] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:03:46 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r1 = dup(r0) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(0xffffffffffffffff) 07:03:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) [ 961.221312] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 07:03:46 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x5f37, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:03:46 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:03:46 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r1 = dup(r0) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(0xffffffffffffffff) 07:03:46 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 961.544584] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 961.571214] FAT-fs (loop5): Filesystem has been set read-only [ 961.595011] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 961.638057] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 961.651885] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 07:03:49 executing program 3: r0 = getpid() r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x37) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 07:03:49 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:03:49 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb809000000dc", 0xa}], 0x0, 0x0) 07:03:49 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:03:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x7e09000000000000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) [ 964.088427] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 964.107446] FAT-fs (loop5): Filesystem has been set read-only [ 964.133017] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:03:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(r0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 07:03:49 executing program 1: syz_open_dev$sndtimer(&(0x7f0000000400)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = inotify_init1(0x0) timerfd_create(0x0, 0x0) write(r1, &(0x7f0000000340), 0x10000014c) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xd) ioctl$SNDRV_TIMER_IOCTL_STOP(r2, 0x54a1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r3, 0x0, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x48080}, 0x80) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, 0x0, &(0x7f0000000200)={0x0, r4+30000000}, &(0x7f0000000300)={0x0}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f00000001c0), 0x4) 07:03:49 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:03:49 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = dup(r1) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$xdp(r3, &(0x7f0000000280)={&(0x7f0000000080)={0x2c, 0x3, r4, 0x35}, 0x10, &(0x7f0000000240)=[{&(0x7f0000000140)="c782e5b7c20ae217c5db1993e0b2b0f2a2ad4fe0590dd81a24188dd9cde6fd2cd2c5f195943a67c1616d2014deb653cfe1eefd36754b9b3f95883e3fe2d87e8f55a405b0345a755184a50a93764bc1305e882774dfd0aab864b47dc4cd83169e1817966144d0f04eeabb2023137315601192c1ff4a06fd820277dd64a637d2372e94c621701465927a5e7084124250f6316de19941f4d8c4af352c19c394997195d50ea5661205da35f3555e619ce3ef554a55ed2db555215f53e6ee3cf18b53960e1695eb95acdf70d38d531a6417f2c5376dc079ffdeb367950ce705e05bd4a868e71b999b", 0xe6}], 0x1, 0x0, 0x0, 0x84}, 0x4000040) wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x37) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 964.174331] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 964.195434] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 07:03:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x6e550000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:03:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x37) ptrace$cont(0x18, r1, 0x0, 0x0) getpeername(r0, &(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000000)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@loopback}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 07:03:49 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:03:49 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 07:03:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x37) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x8000, 0x0) write$P9_RWALK(r3, &(0x7f0000000140)={0x16, 0x6f, 0x1, {0x1, [{0x20, 0x2, 0x7}]}}, 0x16) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) r4 = fcntl$dupfd(r1, 0x406, r0) ioctl$UI_GET_VERSION(r4, 0x8004552d, &(0x7f0000000000)) 07:03:49 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 964.487364] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 964.519877] FAT-fs (loop5): Filesystem has been set read-only 07:03:49 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 964.533037] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 964.548946] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 964.575043] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 07:03:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xa40f0000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:03:49 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 964.801871] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 964.819232] FAT-fs (loop5): Filesystem has been set read-only [ 964.860852] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 964.872248] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 964.882514] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 07:03:50 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x806, 0x0) setsockopt$inet6_buf(r1, 0x29, 0x39, &(0x7f0000068fe8)="ff0204000000000100000000000000000000000000000205", 0x18) setsockopt$inet6_buf(r1, 0x29, 0x1000000000000036, 0x0, 0x0) 07:03:50 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:03:52 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x37) ptrace$cont(0x1b, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xff, 0x20000) ioctl$EVIOCGLED(r2, 0x80404519, &(0x7f0000000140)=""/4096) 07:03:52 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x491, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:03:52 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="0000000000cd06000000000000") getdents(r0, &(0x7f0000000ea9)=""/407, 0x197) 07:03:52 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:03:52 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 967.343287] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 967.361359] FAT-fs (loop5): Filesystem has been set read-only [ 967.397777] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 967.423357] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 967.431978] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 07:04:01 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x37) ptrace$cont(0x400020, r1, 0x0, 0x305b) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) ptrace$cont(0x1f, r1, 0x0, 0x0) 07:04:01 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:01 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x204000000) 07:04:01 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x2, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:01 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 07:04:01 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x3, 0x0) r2 = getuid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000140)=0x0) sendmsg$nl_generic(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000180)={0x234, 0x3f, 0x100, 0x70bd2c, 0x25dfdbfd, {0x1a}, [@nested={0x1c4, 0x49, [@typed={0x8, 0x3b, @fd=r0}, @generic="dd177b65ec20dd3bca804451cddede71c06f98771b879c839cd7cee7ac4f1ba083a5f1cbfe45a5c06c756c9bdf8c556544dc35b40ae2c798fd7e07a740ea6eb7b347b95511c0b6954aa71faaa72bcb848d7cdb98663ecf74687eda895a81f5dfcb4e", @generic="65f33d6c9a6b7543bbe89709bb6a7fbff37d83968e50dab9b50a074924a441f1a3c24da94bacbb6a082d086d4b041eb51775373076a10eb6d1a9bd55dd35133725807e4db9d19ff99774dc153f51911673324011ef1acbf18025e23db1625be3573eb8d2a2923728cdf28f0ed1d22253e8", @generic="fbe68a44146ad63ce5b15db695b4f41273e38a3d86ea833119a9195f320d8ef864f6084e78d28394c72a74517976395b8cd0bf0b71336d28cfad10a054e13fa8eb95220720aec060bda50ec2b6c6310bda16b1bf2bdf714488562625749729667609e3e7a0bdb3ee6b511484b59b2b4c7b42d42b568887ce49a9fd2602", @generic="6bcb321ebc8bdc164f7c269e64c0d2eb45e381c02db824739270433fd7f86e9cdd1e7eb793b21a05ea55ab7498b82cb9c3a8146f52279fdd57ca0b53f77df741ffaa0e584ef88252c23832d40b39d48b16", @typed={0xc, 0x6c, @u64}, @generic="108939", @generic, @typed={0x8, 0x23, @uid=r2}]}, @typed={0x8, 0x1d, @pid=r3}, @generic="d016a9389639081f850a6330cd2c0142e72dcbc2a525fe785cd84c2e387a1d31dbdafdc8d325baafd22b8f49c9fcaa6fb158e9b4f8d7596378de4d4c7bb55d32218f655ab71703fb", @nested={0xc, 0x5, [@typed={0x8, 0x74, @fd=r0}]}]}, 0x234}, 0x1, 0x0, 0x0, 0x40010}, 0x40) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x38) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r4, 0x0, 0x0) 07:04:01 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:01 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x90201fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x37) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 07:04:01 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, '%ead\x00', 0x0, 0x0, '-eqiv_e(hainiv(rfc4106(ccm_base(cbc(camellia),sha3-224-generic))'}, 0x58) 07:04:01 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000280)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000005c0)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}]}, 0x10c) 07:04:01 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000500)=@ipv6_getaddr={0x2c, 0x16, 0xd, 0x0, 0x0, {}, [@IFA_LOCAL={0x14, 0x2, @local}]}, 0x2c}}, 0x0) 07:04:01 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 976.942869] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) [ 976.950361] FAT-fs (loop5): Filesystem has been set read-only 07:04:04 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) rename(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='./file0\x00') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8, 0x400) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000080)={0x8, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r0, 0x1, &(0x7f0000000680)="92921f2d0b49c80b638c3b57619b05072b2457be6865072bfcc637a19ba273fb74209648198088ba7ccbec88fb7daf371f56686ea161745745489c4f96d96631c6b53ba7b74ee87c0f80ec2ce3a15455b0e9bbf199672cd2b22acbb28d0e1eba04d452224d76638f7e10b58f5cf6f5438fd56c6639e3302c4c43581dbc342588735ffa581f") ptrace$cont(0x1f, r0, 0x0, 0x0) 07:04:04 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000140)=0x401) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x100000037) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) fcntl$getown(r0, 0x9) r3 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x0, 0x2000) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000080)='dctcp-reno\x00', 0xb) 07:04:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x80000, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vcan0\x00'}) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)='Z', 0x1, 0xfffffff5, 0x0, 0x0) 07:04:04 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:04 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) close(r0) 07:04:04 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x1a4f0000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x80000, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vcan0\x00'}) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)='Z', 0x1, 0xfffffff5, 0x0, 0x0) 07:04:04 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 979.177073] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 979.203009] FAT-fs (loop5): Filesystem has been set read-only 07:04:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) r3 = dup2(r2, r2) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000040)={'bcsh0\x00'}) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 979.295210] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 979.335050] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:04:04 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:04 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) close(r0) [ 979.385994] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 07:04:04 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x7f510100, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) [ 979.661163] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 979.680297] FAT-fs (loop5): Filesystem has been set read-only [ 979.693652] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 979.718132] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 979.740464] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 07:04:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x37) ptrace$cont(0x18, r1, 0x0, 0x4) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) r2 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) sched_setparam(r1, &(0x7f0000000140)=0x3) ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f0000000080)=r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 07:04:07 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="0000ea2739cda39b714c24e562713c2d0d885c6726f4f60cde4f666657a6d6c34ac4580235be4ef935665803045e77b8444d7d000000000000ba548ae0f8991690c58ab2484d6c37cd6f02e925cbfa08aecc7cde9ca69c88b70a293082dcfa7b523ca6291d27b3f89dac02841e76ca57209068505222ac7806fdbd9961120c28aa23a8d6ae35c15b559bf2556539af6ce8e7aa439272d1e5fcf4d5dbd9cdd2e172aa1ed800d3242ff7eab7008418a9b803ef585f48fdff9c9f6315b7dc85d76a532a992b41d73b8ae0e893c8eed0c2b2e6c2a2cda843b23d8021625a62d2ebb4a3ec7930a37266bc1c441f92b04a0a5ebc07b25f886a6a204a4431081879bc06fe6a8c99a6879b171ad1c4c3bacd42d9712588f49861549b8519e1ff234a761c5a4844d63b93c68da6ce71dfc8f4acfaa23ed29b4456c553b2004df1e36a0ef2ecfb7291c1d9811f4039acb6a3786ff09ed092de1ff886c89de3ce949279fcd86fdf29ef39e5533a02d64f3ea9da6b6cd022c5f30db625a6d05e2b8a8184b1a178a58deff233e9d3b7b895b63c6a885ae19d4189f5"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x9858, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:07 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:07 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) close(r0) 07:04:07 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xe51a, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:07 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x100, 0x0) accept4$vsock_stream(r1, &(0x7f00000001c0)={0x28, 0x0, 0x2711, @my=0x0}, 0x10, 0x80000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() socketpair(0x0, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCLINUX4(r4, 0x541c, &(0x7f0000000080)) ioctl$UFFDIO_UNREGISTER(r3, 0x8010aa01, &(0x7f0000000140)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x37) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0xfffffffffffff334, 0x0) 07:04:07 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:07 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x40, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000640)="08adca61fc5a4e56fd61b612aadf693e0653342b450c1bc95b8b34c57828633f202692fbeee5db3c1a89c770269f6e79a8dd6e32ab637861ddc3b86beae1e1a6e86fff2adf7d74e1e1e7ecfc328e947eec4c5dfbe4880d37a12bb5d38e8458602ea15b9861dc20f361cac5e3fe0b83", &(0x7f0000000a40)="adb20c4185f48f7f5c7cc286a33cdfd8db0c7e9cfaba3a51e4bf32bec69e29ee71effd78c134bcfed7d9bf2eb23c5e9cc216b74adf1762012bf5a6fe26d93de853d3707e8061759edefdf9372857", 0x1}, 0x20) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], 0x195) r3 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r3, &(0x7f0000000480)) ioctl$KVM_GET_EMULATED_CPUID(r1, 0xc008ae09, 0x0) getuid() ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x5) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000580)=0xc) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000980)) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{0x0}], 0x4000, &(0x7f00000007c0)={[], [{@obj_role={'obj_role', 0x3d, '/dev/video0\x00'}}, {@obj_role={'obj_role', 0x3d, '!user'}}, {@measure='measure'}]}) r4 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000001580)="181e9cf342f7b506ba5ec0e50505afcae3af20c6df295e1256c6ea31cca12c28952bbc941b9f2346d21bfcc5c5cb80f646b36d97f62755662af7ede75d6bd2e835b1b5604a9e8d5ab87243195912b673750e8c66195ff148842ab88df9cb77efb6f9b2169452376080c01c929db5ecf97f4840dc560dc91d15f4d547bf2b11b683f0d6bf6eb358cec6b62c54699c55a1b9f930d1662668d7ba8b006857cbf513d3cc8a6f1a6a9e5a60a081607ca785c37a6c3b725e7861b0a5816ecf8c388388929971d7bdfa63713fafa4db673b1d915307d00e85fbe12a88666090a889add9d99b3872b71e349be373c92da0f9d870306c3d6787325dfb66c68dfe580071e66f1d281e70790ee56ff36d8e79eabe4a8c7c5dbd1ad5f3a4eb959bdb6ecd75d5695229c9a34e5c0976cf28c7f5850d160976d2a4041aca03c446fdddacb2c8b384da3259e353233aee372e8e13133e616c8d11e302a636ef37d866a4e41ef6b57ff98c2bb4c612fd890a1f480d55473a76593591ee6f5fb6fc7b7b57e481741fb845e76acac8fcc795d72891459604d1e4362c345b30ca1018a6cd8e559491fc9fe0d26ebabaf9d9563aed750736c9ee4afc24f4e486a68248464621d6861ccd8102be239d1f4147c2b8dd782179dfe14923b5ebb64e59a49d2fba07a9e4da42ef0f5136fb5197858ec38ea89989db5405e0d352bdfb68ed00a9eaf3c13da1edc5c396582f340094a3061145859ff734690ed8d020d30e1afc109be8a451660fe99a54a35fbb3d89db31f6808cb09e3773b7a12ec7c94a77c00c59e651af946ce568503ba00426413ac63e473ce8427d9d9cf7763d83b6fbde2126e488e577577f098154dab8acf04df7be6ba993e9da64a0bf6c5412d968c4733bece9397edc6633ee513111b631d2f94040226577bbd225dcdd92202f26be83bf86fc187f3a82999777d2e88b82825cbf27a10c08070a2c46ecceab037e040fc8e6407f267fe8fd12b8471ce7274264d9e4d7c2809b15c2de1530663c573c97009ca3322f63d11fe2249e0e1c205bc98323a3fe85933b20e0b85c632951118f2be6748f9caf20904feebd5b56c88e8109669a47011b590035f5d091e4a51611d69e7d08288acedbe695ca84444dcaa1eb0224c2e2b917b9a8d99f40e5c5ef3cc29f0a398a77d3ab2a594dfc652eeb893af9e02a20c4d923d0d76efdff8c07c7c49648aeceb29ac6bb67f04c6825ef4cb0a0cf473003d3ddc79b2ace5c9786e8d22c381f69532c8e6963bab01c4f37ec3b3172f650875239d8f36bfb157b78cfd6ecf3eb18fc95057fc031b55b1e5eed12d2993b79ebc8937d991d09d7c25be901a34697c187009757fab2e0a98c882358d53b88b99dd81d8f0027a6d2e4a2bdbcbd664ce238e0fc2ca9dd2c2dd22e65294633a8031399fe543e55681e35c62958d9b735fa25730e8e9b73553d7f8cfe04331c3d7ee7ab4484337564dd9e0ed5a3e0ecb614821e1723d31412d9a75ef38af7175de971ad84c79ce32429e17c84a894e7fe04d2c868efa32a36c574897ee45b28e68e8f58a7fee755b6e965d8d57dfb378217e5886f7b000b6f92a293190c4a363fe238c17396dc3afe6665368b3555f13556199d28812657675738c97c695fddd757dc0bcdbd312c0528dc5c90d28de0066335f0a37578f7923d4f41b61713d53669b6998d7bbc43e8b1394084d29ab81192f9f54ae85851cafa25ba1954ab3630712627c004ac0d8c496d00c410410fb96520d0c76ec012ded7a4dde2fede22dd08b55ebddabfca0d53eb56edeb265fb3e385ad30762727e0eba1928650fae5bf3c0551b9fa5c4776d4418f55e444b243bc66e5bdfdcb4f5c8b2003e7b97ba36c522a44fc2d54395169153e5f902e2946c0bb9190a865aa004584ab00a84c936c9140f2a9204c075488d603b56458eac595ae1fa795bb43ab7e78e7e13b1743389e70e5bd654c92f014a8b369b78a525ec9b114a70961607f4b3007228e5917d4ef6dd2460120663c2d47748b1b7398674f2b8735270a2d91341365968ab3b700cb3c58c17ae376f61e4416064d5fc1a3e8047c54f46c09ac0ea086f024a1e1e81466d6bce61226ae62800e8d468dcba0839db59123be5c29db80593cf582386041b859a8badabc285a4f74b4cff1ca3bda9dbadd7d0c75252bb2d968c08561d89fab192aca9331ffa3468b93299791a7473d9da9b4ad3df0025c65e72b20cd6be0958474be257122402edebfa51fc885a5332771a50a806724977a68a5c4d62d5a59b9e6cffdcec9360bae04d95f828e92054e814593a244d415d507e8819669ad40f3a3db0a1f21498d4e8ac228ce58babc8809907a5e6b97739c3e60cfe73cd07735db43ed858961c8b5afb675581ca6b8d5c2ea2c562cb0b6c559e7445a26f7a7d2861d7dc117f60ce8e292c235cfe653acd3c185520999b25d2350839fa4dca97712302f6b6f12442cbb4516d73801b28f57e23d7a7de72bfd77ec2365227c8e6b72c250c4840538112cc9d6899b95325bce21b26cf9779b068bc7a42733f1732a369ac1f4265f6b36ab037896f4d294f502821b5e2c245e5fdf3e60c702cd6efda155c239865e032075293ada328cb05df235d10349c61d11dc9ec7fdd03a03f001306f18d4527a85668e0577b9b3088a2f0df6deba6bc892fffebe1fbe93e3bf48dd8c0a7686636aba4c9ac453cf92fdf06f2b66ab414d75080665942082ffb8b55ecacbc780d6d22c6c8a16a7f86108dd40eeedca0e0cc85dfc4ae2ea5c9962f60ef280df02b46b2ab2d20aefd5164f684160283f90ddee23fad5fad33fcc11111f537667b14d1b15ada2e26855f050807391aeb7a01966ba155deac6a5d4f890774979a7c55cb719eb858bb44e04c4937df0e1f8986bce9ce081d655d8eef3d5b298a88b3e8ea153ea894810376ec71fa2a36d02c7e55c5b4de560ab5ba850db14a9cac0ac33eba56d09004aa082ff2160b1eb1506b83f15f8619b1ceae55918cdf2f95d983ad1e0ce6902d86ef4e16e0da69444862ce346ecf0de1665cd3354c33ff58200f65bbb96906566fc308c74f61a7d0dd2eb4b95db1906a4e95306bc15e04da7d91f0c1a28cfea3a53aa705ec0de31f05ffb3e78f043b87001b147d7db0fb824d6bd11a1bd7ed874efaa1aa78ab13754f4d8bb53ab483bb72fc9ba2a73618272ccde68b04cc82db58fc8d5a28b7dbe0ddb4d8b7ce594dfb2e08bcb946ef91b0f7f55c91d306d79917e7b97e3bdce752a5d8ab59e5e45ac835c218ae1103e08d805804e605e1550bca885c2b55b05a1423e9cb1f1d7892e24b9af80f84e0d137f46f3a0a271241d625eea0033188e27b1ebaaaad8c9d22c7dd90bf5c2712436f14d18e509eb81fd314f45b47aca3aec70f99fc69984f69cf44b992b7c2f02ccf3b0bdd8e6be83e5b0aa5acfb570216b1ae060d6991c5d9233d5f9d1e2362fa0db10f36074d0b64c925546463c8d192914c4eafcaae1269f253d44aba1cdd8b3846be562cd7e67fd6b788be155cdbac924ec68bc1060dc3d6c58aff3f7349427bdb85e9208ee6f9c0a492dba2956da0cc3bf41e66f15e0e8b0b5487d336c57453fe4ae7af707fb3cd714e8690c825cc4291c48b3c5671257d52ae172a6d53ead78dec9b568706835829aab8acc42387e98b6f3a4483659e99088ba96e209d16c538f59b25f94baf284150a30f489fcc5b398adaeb6ff5ceac337567b777c9236ec0da2c3965e55867a819d9e72b3521cce5c1cb5c58bc2d6d61f421a661373c62afe9af3b023cd06d46213b8cd209c0494d90c1925cc1f2f4158fb36e45f3ae2184dcc0643a31da832b5d51a31942245a793500958d66bd23678ae5e132e8677c24e96cacb13e4fe0e1a1eb2b947621c39b04e2b4fbe5c7d6239abe0a494c33dca1a482452a0c643399ce523e912b1a1faa803f36d22f414855e4fe9d00aa381e6e3cc5c0f3e001a3c5a25a63e129e47a43b23276a3bbf6c3d895cc0441b3b809be62eea7044408747804488fc570c92a2509a1d60b1ac1f644c55d6fd2dc4ab4b771fa4f010640e78585e5c2260c8df47a11ad697f4746cd30fe19e9eeea40c450961cade2378ed693fce3a3846f2bc9477c34121db0ad9e39c0c7eaeb1bb2b224faa7d13dbdb7f7f5be2f8756bb4b504c6b08cca3a51f2c083e30b07db331c4b887aae8b49e9828d2c592f4f7386eccdc2f8a5d015cf9a813eab988b56cb1392c07859f5dad49c217b2d29284e1af6706114304fc1b0d949a7459ae1bb1456ccf78835ead2a30c28bd086150c600dd1e2bf1e241b033f919336ec75a19b38cb2ed0978c3246e8669cba48b76e934b746d0e0773e35de26588106c77316c622b3899df0a5d2382be5c96ab18dffe55f6c03a33e4a4d81acdff6743cbc907ec94b00e3a30bd04db76892067f2dd73a876a8c5e8fb9d1f914c3c0d692c979a507c3f51b12dd92304b81bc78ed21fab2ce288dbd2732f17b4d184ab1740f76f46a9b5d2c2cb18a108d738f26d8c0e72f54e215f3f2b36cc46c0839f1c40147d808445e790f20842dd507cbb3d89404a0e7b4f83630aee734adb9e4a7d0ace1a972fa70868e03269c4a1c1fdc1e4bde73996faf753ee4b7b0aabc6496933d9b1444f50b54c5531dc8853c5c6013ba7ec0a82fd910ad010a02e56523f3ecc18ba9182bea3235855f5966afee4ea05b7c5e5b1f02f6614f2ef6a5ff1829b8bafd60f606dc9bab8b2233ed417633c00ed63300d302b5ecae01509a6591a90f46513cb07ab528f5df1191bb48c41a5e4f6d3279724ff451c5ffe4d215b87cd689d159206b36e96dcebaec356fe96714a567c14a42e61c864d9dff6ed5dd7cbd095c7a4db557782e6c7278c3ce5cd3adcb1b0996ba367a8cdd5ea975d9c866230585937acb01b9e403177b3dc467961424c92620a95f34100494f101e5e86952c63810e6f116c3155426d49dec871ee0179e9e3de9beb1a86a0eff80e6289e8bcf070a95e91a2c8919c0372f059e5d0cfff250180ba5971f00a40f89081f6768efee9a0b31a9889bf7eb8c8f11be53435f477877db2490034b55fadaa45a86daf62690f11b985cec3c24cb18202c425206d4f3d1581b0ceb6d3bfc7c958611157c222c00f75b379fbf520e78586df2fad6472f5adb6b976aa6130aaaefb78c747702fae4667bc8b77534864e9eb944f3bfbd889ff14cae27a2ace144b676b0da2b6c8a75d3e0d7c25885c9e4383f8f0abceebce7515895c37bed1f57b942998f3e4ae555979ed9865c2b151208df4793fb400cfd07299073b5fc2c3ffe9af95f8dc9d1ea15c57112a335e072bd5dd68b4c78063974ae3ef607d074ede89efc2d570c083a9b15ea63327b9b720f0c005f73ff5becaadc0ddff6de2c4069f7625f53d8fa957784b5b7a42e7a1754bcf7fc6c90d54f0468da36822b994573b88fff2409ba72e762b39329e7a016fa8178d2b969c000a091d641a4eccf877db7c07fed1b19e9dcade1600836c038d9f59acc933ccb5cd9070939a9c137749c4b5ab4867f605a450ea01cc9ff79b9983d57e8f1d65d1ae65ddd18e66cd98667c872fef020b48f7c8cf7394ad59a22bbea36bfb15e6c5d7789cc85c3a8202e75e24fd55bf99f369c794d75d40ca9681cd4a0e9fd71c357a48bef9f8540fe2acb84b5d06454607834f0965e2ea2329b2965af9fc74f1314d1324cbfafa2a3b54f391bdfe8c7c5bb90ecddaa697f93424abb4cc74960a3c37016a2c8c1dcf1743b753006e4067927ee64c110f7721bf1a7ff0b", 0x1000, 0xfffffffffffffffe) r5 = add_key(&(0x7f00000006c0)='cifs.idmap\x00', &(0x7f0000000880)={'syz', 0x3}, &(0x7f00000008c0)="0a1da12968863f980d48d9c3feaa1acd1bf001db1cd425dac3c0713e34248f73cce20418bfc958405d89ba2e47fc0662a3012536504832ef8fb9fbfef63b7fd511eb72c3d91e141e174e0e81c879b24349193cb184fab2a91a78d3e4f10cab8978647546512fa8cdffb2e2dd5f63b9ae288bd8d221789c68dc251d8a537ba233e3f388deb6981fa84818ecf7552ad36c4364d30c8f9ce41077", 0x99, 0xfffffffffffffffd) keyctl$instantiate(0xc, r4, &(0x7f00000005c0)=@encrypted_update={'update ', 'ecryptfs', 0x20, 'user:', '!user'}, 0x1b, r5) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:04:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x100000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x37) recvmmsg(r0, &(0x7f0000002540)=[{{&(0x7f0000000140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000001480)=[{&(0x7f0000000000)=""/46, 0x2e}, {&(0x7f0000000080)=""/20, 0x14}, {&(0x7f00000001c0)=""/7, 0x7}, {&(0x7f0000000200)=""/44, 0x2c}, {&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/244, 0xf4}, {&(0x7f00000003c0)=""/141, 0x8d}, {&(0x7f0000000480)=""/4096, 0x1000}], 0x8, &(0x7f0000001500)=""/104, 0x68, 0x200000}, 0xfff}, {{&(0x7f0000001580)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000001bc0)=[{&(0x7f0000001600)=""/136, 0x88}, {&(0x7f00000016c0)=""/251, 0xfb}, {&(0x7f00000017c0)=""/38, 0x26}, {&(0x7f0000001800)=""/252, 0xfc}, {&(0x7f0000001900)=""/19, 0x13}, {&(0x7f0000001940)=""/192, 0xc0}, {&(0x7f0000001a00)=""/60, 0x3c}, {&(0x7f0000001a40)=""/93, 0x5d}, {&(0x7f0000001ac0)=""/255, 0xff}], 0x9, &(0x7f0000001c80)=""/120, 0x78, 0x80}, 0x3}, {{&(0x7f0000001d00)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000002440)=[{&(0x7f0000001d80)=""/10, 0xa}, {&(0x7f0000001dc0)=""/248, 0xf8}, {&(0x7f0000001ec0)=""/131, 0x83}, {&(0x7f0000001f80)=""/222, 0xde}, {&(0x7f0000002080)=""/202, 0xca}, {&(0x7f0000002180)=""/8, 0x8}, {&(0x7f00000021c0)=""/223, 0xdf}, {&(0x7f00000022c0)=""/55, 0x37}, {&(0x7f0000002300)=""/242, 0xf2}, {&(0x7f0000002400)}], 0xa, &(0x7f0000002500)=""/13, 0xd, 0x7efe}, 0xb740}], 0x3, 0x100, &(0x7f0000002600)={0x77359400}) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000002640)={{{@in=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000002740)=0xe8) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r3 = syz_open_dev$amidi(&(0x7f0000002c00)='/dev/amidi#\x00', 0x3, 0x20000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000002c80)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000002c40)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000002cc0)={0xf, 0x8, 0xfa00, {r4, 0x2}}, 0x10) ptrace$cont(0x1f, r1, 0x0, 0x0) pipe2(&(0x7f00000029c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_GET_MSR_INDEX_LIST(r5, 0xc004ae02, &(0x7f0000002a00)=ANY=[@ANYBLOB="000000009652c61d0d0c47e8e2152bad8175a90b2fc66c7dfdcd65a09dabbe720e0c8f492a6671bdc95275c92946109525a175b65d357e81010be64f80eebe2a791f0a77a17ab077ec7d76c378e3da3b50f62877c31c61c10496a7600f8c221d0d08ec47c7098d82011d50abdeb15328477f0a607a8ceb62226ded8b1776dc0008bb60288ceb1a6db37c4fee32df59d99aa17e17fa0cb108204c946b7afac7f683d308c7de39ba82c209227eac17ee67fd000000000000000012000000000000cd7deb8496f23f1dbb42e3c4a556a9ea8b9aea743ed9776ef5b61dc7a3f9f0dd87c21015893b1d1308315220225e66bef61621a0d8d663b01821704507710537b61fbcc5937c949e464e0e9732c393e1c7b96a21c1b9fe60cb87c559d41307fc8c970811e41c28b68c275221ca993da168398569433f3c3a2e7f9f48883c7d9501d2572527e5fbcd5130f1bb1b6b4ab7709a56f0ee0b982b3d51ae1a78f73e226ff43fa15314b5f0d1ac0947eed8cae6ad682d6dbd0e5d1332ff705b2d47f954e7665e86e0600619ae92c1737cb936db1022f6c89c9015ffffffffe5561a6273b0117a6592de589a033538cb74d85db4c82557dd17a40c07ae2ab2af54ffd2c0"]) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r5, 0x40405514, &(0x7f0000002bc0)={0x0, 0x5, 0x979, 0x80, 'syz1\x00'}) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002400)='/dev/vsock\x00', 0x400000, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000002900)={0xffffffffffffff9c, 0x10, &(0x7f00000028c0)={&(0x7f00000027c0)=""/239, 0xef, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000002980)={r6, 0x10, &(0x7f0000002940)={&(0x7f0000002780)=""/30, 0x1e, r7}}, 0x10) [ 982.326623] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:04:07 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x37) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 07:04:07 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 982.386449] FAT-fs (loop5): Filesystem has been set read-only [ 982.453050] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 982.500137] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 982.508625] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 07:04:07 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:07 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x6711, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:07 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x20000, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x4000, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video1\x00', 0x2, 0x0) 07:04:07 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:08 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 982.837950] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 982.856991] FAT-fs (loop5): Filesystem has been set read-only [ 982.883363] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:04:08 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 982.927026] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:04:08 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 982.991395] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 07:04:08 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x9808, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:08 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xe51a, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:08 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:10 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x37) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r1, 0x1f, &(0x7f0000000000)) ptrace$cont(0x1f, r1, 0x0, 0x0) 07:04:10 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r0) 07:04:10 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:10 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="0000ea2739cda39b714c24e562713c2d0d885c6726f4f60cde4f666657a6d6c34ac4580235be4ef935665803045e77b8444d7d000000000000ba548ae0f8991690c58ab2484d6c37cd6f02e925cbfa08aecc7cde9ca69c88b70a293082dcfa7b523ca6291d27b3f89dac02841e76ca57209068505222ac7806fdbd9961120c28aa23a8d6ae35c15b559bf2556539af6ce8e7aa439272d1e5fcf4d5dbd9cdd2e172aa1ed800d3242ff7eab7008418a9b803ef585f48fdff9c9f6315b7dc85d76a532a992b41d73b8ae0e893c8eed0c2b2e6c2a2cda843b23d8021625a62d2ebb4a3ec7930a37266bc1c441f92b04a0a5ebc07b25f886a6a204a4431081879bc06fe6a8c99a6879b171ad1c4c3bacd42d9712588f49861549b8519e1ff234a761c5a4844d63b93c68da6ce71dfc8f4acfaa23ed29b4456c553b2004df1e36a0ef2ecfb7291c1d9811f4039acb6a3786ff09ed092de1ff886c89de3ce949279fcd86fdf29ef39e5533a02d64f3ea9da6b6cd022c5f30db625a6d05e2b8a8184b1a178a58deff233e9d3b7b895b63c6a885ae19d4189f5"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x48c6, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) [ 985.560822] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 985.578443] FAT-fs (loop5): Filesystem has been set read-only 07:04:10 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2102, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r1, 0x4010ae94, &(0x7f0000000080)={0x751e, 0x3, 0x1}) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f0000000140)="3e059344bea59656fdccefad58051762d2f1439bd5e43ad149c2c7deea3c50640c7ea24f568657dba098132bd71379d86e9f9270e903") 07:04:10 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:10 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:10 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 985.628653] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 985.656653] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:04:10 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x4000, 0x0) ioctl$VIDIOC_G_AUDOUT(r1, 0x80345631, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 985.683836] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 07:04:11 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x5b4a0000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:11 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r0) 07:04:11 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:11 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) sendmsg$nl_netfilter(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20804800}, 0xc, &(0x7f0000000540)={&(0x7f0000000200)={0x328, 0x8, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {0xf, 0x0, 0x4}, [@generic="da4a1b88b1b202c24840d0de70d8847dc801af8834f8723fdf036583dac63a407f4ee77b47ae1b", @typed={0x70, 0x62, @binary="3f05ef7b386add1c1e16e0a15a38295e64710270bd2c812c98d9d79e053aaf7f9e58d1827b9c1875da026e173582b669f2c8c0986abbda94498a2b8da3fa1e2b3b553c79526d8f20fe5e5ffb8feae048ab93b3ff62d1bbb9c93cbd6896b678603aa132411c4c004d6c487705"}, @nested={0x198, 0x84, [@typed={0xc, 0x2c, @u64=0x2}, @generic="730dfce7a6f31799961c4dcc4a53c2b831a96e736bf1129d81a3f55424d2a4c71e03c4fb849ca4c7e9beb8b3dedf7abeff9b6e3e2dd6a19f729706b8c6600a6b357a2c7be92d86c0efe0d89a58dc0e6260972852f4a8603d0d5f8137a16e95cba571d4ac86c0f1946eaa2cc21701126208700417fc413cea4450dfc1d41a8bbd09561873cde0aaa7bb3b3eb532235c1db75d1df19d2d7e70bb32a8779e12206508615784459385b6daf093713f49f47c56818be9d8ed325aa717f71341b869f0b956f44d51095782fd93586752725455e769", @typed={0xc, 0x63, @u64=0x3}, @typed={0x34, 0x7a, @binary="cd9420978aa54dff632a98a752c98be15279ee4f99f90fb6c19b3a391eed52a18d89d86c056bf1c78bbc98200dad49"}, @typed={0x8, 0x4a, @fd=r1}, @typed={0x14, 0xc, @ipv6=@dev={0xfe, 0x80, [], 0x16}}, @generic="8773c737d8ece811fa0cffcafeb93c2eea16e8342fcf5683f03425dc6c3c25a0ca25c1e18899c87754a7ac48389822164345dd96b7ad1de9d7c3f0026acd5a1c30f605b01f2801d55b5b033b7f2b027c7d8e5b345d206f5feb"]}, @nested={0xe4, 0x20, [@typed={0x8, 0x2c, @fd=r1}, @generic="592aa0d568a6d840c75dca114eb78978c769b189d37fbb0466af122eb2a98f923fc25dac1c111c04e033998bc4c20382d4a0bc507173fe49c11ed07602759bb96c2655a6e1d6641b0bdd79b9633c0701500fbdb0ff7f4f6d7b5f1a5dbcbb53a1eae3a92a2e439ae24e3e34584929a7dd07dc45fc26694f27864b82005658dcaacd9215c9cf585844fcac20ff2ee47f79f36edf446afe035d99890cbeed990e93b78e05cbc425ba72ffab097cd0085f78c4431c29f7fe310c835f53", @typed={0x14, 0x27, @ipv6=@local}, @typed={0x8, 0x93, @u32=0x59}]}]}, 0x328}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) tkill(r2, 0x37) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 07:04:11 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x37) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) r3 = dup3(r0, r0, 0x80000) recvmsg(r1, &(0x7f0000001980)={&(0x7f0000000680)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001840)=[{&(0x7f0000000700)=""/14, 0xe}, {&(0x7f0000000740)=""/4096, 0x1000}, {&(0x7f0000001740)}, {&(0x7f0000001780)=""/10, 0xa}, {&(0x7f00000017c0)=""/65, 0x41}], 0x5, &(0x7f00000018c0)=""/191, 0xbf, 0x9}, 0x2) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000019c0)={r4, 0x1, 0x6}, 0x10) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r5 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x4, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r5, 0x5387, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000340)={0x0, 0xfffffffffffffcb6, 0xfa00, {0x8, &(0x7f00000002c0)={0xffffffffffffffff}, 0x111, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r5, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {&(0x7f0000000140), 0x4, r6, 0x30, 0x1, @ib={0x1b, 0x6, 0x7, {"41aee39951cca24acbf70f0a17f22a45"}, 0x5, 0x4, 0x6}}}, 0xa0) 07:04:11 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair(0x9, 0x803, 0x4, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_int(r1, 0x0, 0x3f, &(0x7f0000000080)=0x51, 0x4) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 07:04:11 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) sendmsg$nl_netfilter(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20804800}, 0xc, &(0x7f0000000540)={&(0x7f0000000200)={0x328, 0x8, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {0xf, 0x0, 0x4}, [@generic="da4a1b88b1b202c24840d0de70d8847dc801af8834f8723fdf036583dac63a407f4ee77b47ae1b", @typed={0x70, 0x62, @binary="3f05ef7b386add1c1e16e0a15a38295e64710270bd2c812c98d9d79e053aaf7f9e58d1827b9c1875da026e173582b669f2c8c0986abbda94498a2b8da3fa1e2b3b553c79526d8f20fe5e5ffb8feae048ab93b3ff62d1bbb9c93cbd6896b678603aa132411c4c004d6c487705"}, @nested={0x198, 0x84, [@typed={0xc, 0x2c, @u64=0x2}, @generic="730dfce7a6f31799961c4dcc4a53c2b831a96e736bf1129d81a3f55424d2a4c71e03c4fb849ca4c7e9beb8b3dedf7abeff9b6e3e2dd6a19f729706b8c6600a6b357a2c7be92d86c0efe0d89a58dc0e6260972852f4a8603d0d5f8137a16e95cba571d4ac86c0f1946eaa2cc21701126208700417fc413cea4450dfc1d41a8bbd09561873cde0aaa7bb3b3eb532235c1db75d1df19d2d7e70bb32a8779e12206508615784459385b6daf093713f49f47c56818be9d8ed325aa717f71341b869f0b956f44d51095782fd93586752725455e769", @typed={0xc, 0x63, @u64=0x3}, @typed={0x34, 0x7a, @binary="cd9420978aa54dff632a98a752c98be15279ee4f99f90fb6c19b3a391eed52a18d89d86c056bf1c78bbc98200dad49"}, @typed={0x8, 0x4a, @fd=r1}, @typed={0x14, 0xc, @ipv6=@dev={0xfe, 0x80, [], 0x16}}, @generic="8773c737d8ece811fa0cffcafeb93c2eea16e8342fcf5683f03425dc6c3c25a0ca25c1e18899c87754a7ac48389822164345dd96b7ad1de9d7c3f0026acd5a1c30f605b01f2801d55b5b033b7f2b027c7d8e5b345d206f5feb"]}, @nested={0xe4, 0x20, [@typed={0x8, 0x2c, @fd=r1}, @generic="592aa0d568a6d840c75dca114eb78978c769b189d37fbb0466af122eb2a98f923fc25dac1c111c04e033998bc4c20382d4a0bc507173fe49c11ed07602759bb96c2655a6e1d6641b0bdd79b9633c0701500fbdb0ff7f4f6d7b5f1a5dbcbb53a1eae3a92a2e439ae24e3e34584929a7dd07dc45fc26694f27864b82005658dcaacd9215c9cf585844fcac20ff2ee47f79f36edf446afe035d99890cbeed990e93b78e05cbc425ba72ffab097cd0085f78c4431c29f7fe310c835f53", @typed={0x14, 0x27, @ipv6=@local}, @typed={0x8, 0x93, @u32=0x59}]}]}, 0x328}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) tkill(r2, 0x37) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 07:04:11 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 985.996423] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 986.032338] FAT-fs (loop5): Filesystem has been set read-only [ 986.123363] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:04:11 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r0) 07:04:11 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 986.175945] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:04:11 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="0000ea2739cda39b714c24e562713c2d0d885c6726f4f60cde4f666657a6d6c34ac4580235be4ef935665803045e77b8444d7d000000000000ba548ae0f8991690c58ab2484d6c37cd6f02e925cbfa08aecc7cde9ca69c88b70a293082dcfa7b523ca6291d27b3f89dac02841e76ca57209068505222ac7806fdbd9961120c28aa23a8d6ae35c15b559bf2556539af6ce8e7aa439272d1e5fcf4d5dbd9cdd2e172aa1ed800d3242ff7eab7008418a9b803ef585f48fdff9c9f6315b7dc85d76a532a992b41d73b8ae0e893c8eed0c2b2e6c2a2cda843b23d8021625a62d2ebb4a3ec7930a37266bc1c441f92b04a0a5ebc07b25f886a6a204a4431081879bc06fe6a8c99a6879b171ad1c4c3bacd42d9712588f49861549b8519e1ff234a761c5a4844d63b93c68da6ce71dfc8f4acfaa23ed29b4456c553b2004df1e36a0ef2ecfb7291c1d9811f4039acb6a3786ff09ed092de1ff886c89de3ce949279fcd86fdf29ef39e5533a02d64f3ea9da6b6cd022c5f30db625a6d05e2b8a8184b1a178a58deff233e9d3b7b895b63c6a885ae19d4189f5"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x98580000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) [ 986.253580] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 07:04:11 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:11 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r1 = dup(0xffffffffffffffff) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) 07:04:11 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 986.446197] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 986.470180] FAT-fs (loop5): Filesystem has been set read-only [ 986.517344] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:04:11 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:11 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r1 = dup(0xffffffffffffffff) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) [ 986.724202] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 07:04:14 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendfile(r0, r1, &(0x7f0000000000), 0xffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x1, 0x701040) write$P9_RGETLOCK(r3, &(0x7f0000000140)={0x1e, 0x37, 0x2, {0x0, 0x2, 0x5, r2}}, 0x1e) wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x37) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 07:04:14 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r1 = dup(0xffffffffffffffff) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) 07:04:14 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) sendmsg$nl_netfilter(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20804800}, 0xc, &(0x7f0000000540)={&(0x7f0000000200)={0x328, 0x8, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {0xf, 0x0, 0x4}, [@generic="da4a1b88b1b202c24840d0de70d8847dc801af8834f8723fdf036583dac63a407f4ee77b47ae1b", @typed={0x70, 0x62, @binary="3f05ef7b386add1c1e16e0a15a38295e64710270bd2c812c98d9d79e053aaf7f9e58d1827b9c1875da026e173582b669f2c8c0986abbda94498a2b8da3fa1e2b3b553c79526d8f20fe5e5ffb8feae048ab93b3ff62d1bbb9c93cbd6896b678603aa132411c4c004d6c487705"}, @nested={0x198, 0x84, [@typed={0xc, 0x2c, @u64=0x2}, @generic="730dfce7a6f31799961c4dcc4a53c2b831a96e736bf1129d81a3f55424d2a4c71e03c4fb849ca4c7e9beb8b3dedf7abeff9b6e3e2dd6a19f729706b8c6600a6b357a2c7be92d86c0efe0d89a58dc0e6260972852f4a8603d0d5f8137a16e95cba571d4ac86c0f1946eaa2cc21701126208700417fc413cea4450dfc1d41a8bbd09561873cde0aaa7bb3b3eb532235c1db75d1df19d2d7e70bb32a8779e12206508615784459385b6daf093713f49f47c56818be9d8ed325aa717f71341b869f0b956f44d51095782fd93586752725455e769", @typed={0xc, 0x63, @u64=0x3}, @typed={0x34, 0x7a, @binary="cd9420978aa54dff632a98a752c98be15279ee4f99f90fb6c19b3a391eed52a18d89d86c056bf1c78bbc98200dad49"}, @typed={0x8, 0x4a, @fd=r1}, @typed={0x14, 0xc, @ipv6=@dev={0xfe, 0x80, [], 0x16}}, @generic="8773c737d8ece811fa0cffcafeb93c2eea16e8342fcf5683f03425dc6c3c25a0ca25c1e18899c87754a7ac48389822164345dd96b7ad1de9d7c3f0026acd5a1c30f605b01f2801d55b5b033b7f2b027c7d8e5b345d206f5feb"]}, @nested={0xe4, 0x20, [@typed={0x8, 0x2c, @fd=r1}, @generic="592aa0d568a6d840c75dca114eb78978c769b189d37fbb0466af122eb2a98f923fc25dac1c111c04e033998bc4c20382d4a0bc507173fe49c11ed07602759bb96c2655a6e1d6641b0bdd79b9633c0701500fbdb0ff7f4f6d7b5f1a5dbcbb53a1eae3a92a2e439ae24e3e34584929a7dd07dc45fc26694f27864b82005658dcaacd9215c9cf585844fcac20ff2ee47f79f36edf446afe035d99890cbeed990e93b78e05cbc425ba72ffab097cd0085f78c4431c29f7fe310c835f53", @typed={0x14, 0x27, @ipv6=@local}, @typed={0x8, 0x93, @u32=0x59}]}]}, 0x328}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) tkill(r2, 0x37) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 07:04:14 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x744, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:14 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:14 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = semget$private(0x0, 0x5, 0x0) semctl$GETALL(r1, 0x0, 0xd, &(0x7f00000001c0)=""/147) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x60000, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timerfd_settime(r2, 0x1, &(0x7f0000000140)={{0x77359400}, {r3, r4+30000000}}, &(0x7f0000000180)) ptrace$cont(0x1f, r0, 0x0, 0x0) 07:04:14 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpgrp(0x0) ptrace$cont(0xf, r1, 0x32, 0xffffffffffffff80) clone(0x806a000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setregs(0xd, r2, 0x20, &(0x7f0000000140)="315158d9a1e7f7d8285dbad2126d05300ef4679aa1cd9a678d556fd476ce8e76e07fa75527cd557a8470976df4db1c6e8f9ef78b60cd5d36eb83e75d87437216573336") ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x37) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace(0x10, r2) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) socketpair(0x18, 0x80000, 0x69b99def, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) statx(r3, &(0x7f0000000080)='./file0\x00', 0x0, 0xfff, &(0x7f0000000240)) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0xc7a) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000001c0)=""/79) 07:04:14 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:14 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x37) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0xf4, 0x100) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f00000001c0)={{0x7, 0x0, 0x9, 0x7fffffff, 'syz0\x00'}, 0x3, 0x40, 0x1, r1, 0x4, 0x6, 'syz0\x00', &(0x7f0000000080)=['ppp1\x00', '.self(\x00', '}lo.\x00', '\x00'], 0x12, [], [0x5, 0x7ff, 0x1, 0x8]}) ptrace(0x4207, r1) ptrace$cont(0x1f, r1, 0x0, 0x0) r3 = dup2(r0, r0) ioctl$EVIOCGPHYS(r3, 0x80404507, &(0x7f0000000140)=""/120) 07:04:14 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 989.168453] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 989.204546] FAT-fs (loop5): Filesystem has been set read-only 07:04:14 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:14 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="240000001800010100000000000000000200ac141400b1d6fc5a80c3eaa00614e724e5ce7398e1fd"], 0x1}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 989.284511] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:04:14 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:14 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(r1, 0x0, 0x1000000080000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x37) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) 07:04:14 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 989.359783] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:04:14 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:14 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x10000, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000080)=@int=0x10a45b39, 0x4) wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x37) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 07:04:14 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x2209, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:14 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 989.480618] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 07:04:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000180)={0xffffffffffffffff}) statx(r1, &(0x7f00000001c0)='\x00', 0x1000, 0x0, 0x0) [ 989.681957] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 989.693781] FAT-fs (loop5): Filesystem has been set read-only [ 989.721249] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 989.731920] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 989.741814] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 07:04:17 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) 07:04:17 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)="6576656e7473000000c7aaff0fb0c79b9391e4ae6459d80000000000", 0xf0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x40086607, &(0x7f0000000000)={0x7ffff, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}) 07:04:17 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_create(0x77) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 07:04:17 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:17 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x86a, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) [ 992.258714] EXT4-fs warning (device sda1): ext4_group_extend:1791: can't read last block, resize aborted [ 992.277244] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 992.293187] FAT-fs (loop5): Filesystem has been set read-only 07:04:17 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)="6576656e7473000000c7aaff0fb0c79b9391e4ae6459d80000000000", 0xf0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x40086607, &(0x7f0000000000)={0x7ffff, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}) 07:04:17 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) [ 992.322325] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 992.338163] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:04:17 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 992.377282] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) [ 992.402017] EXT4-fs warning (device sda1): ext4_group_extend:1791: can't read last block, resize aborted 07:04:17 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000240)=r2) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x37) ptrace$cont(0x18, r3, 0x0, 0x0) wait4(r2, &(0x7f0000000000), 0x20000009, &(0x7f0000000440)) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x2d}) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000280)=0x2000000000000, 0x4) 07:04:17 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x2d0a000000000000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:17 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x406, r0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f0000000140)={@generic={0x3, "8598b1d5283d81c9a7c6a91bb4d6217d770a5792fcf3a8263b81ca1843f0c562508d49e8b3f3b3450cb7ee57bee8df0b04b1bb04e6dfa354e062bb8afb154076e8ac7722f053d1d23f60d829e5e4a083410d08ba1a93f42caaae96e4a0ea5797853c235b1a23aba07fb4763a960131d6731cec3ebd9a87ab555d8f1c467d"}, {&(0x7f0000000000)=""/13, 0xd}, &(0x7f0000000080), 0x2}, 0xa0) tkill(r2, 0x37) ptrace$cont(0x9, r2, 0x5, 0x2ad29441) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 07:04:17 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000002440)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000001c0)='cgroup.max.depth\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000040), 0x12) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000004c0)) 07:04:17 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) 07:04:17 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:17 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) wait4(r1, &(0x7f0000000200), 0x80000002, &(0x7f0000000140)) wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x37) ptrace$setopts(0x4206, r1, 0x7, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 07:04:17 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000002440)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000001c0)='cgroup.max.depth\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000040), 0x12) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000004c0)) 07:04:18 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = dup(0xffffffffffffffff) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) 07:04:18 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x37) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x100) setsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f0000000080)=0x1, 0x4) 07:04:18 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:18 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xfc020000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000001100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=""/79, 0x4f}}], 0x1, 0x0, &(0x7f0000007040)) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) writev(r1, &(0x7f00000000c0), 0x200000000000014c) 07:04:18 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = dup(0xffffffffffffffff) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) 07:04:18 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:18 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = dup(0xffffffffffffffff) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) 07:04:18 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:18 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 993.029791] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 993.047110] FAT-fs (loop5): Filesystem has been set read-only [ 993.134354] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 993.156668] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 993.165727] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 07:04:20 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4208, r0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x1) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000080)=0x6) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x34, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 07:04:20 executing program 1: r0 = socket(0x2, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000000a40)={&(0x7f0000000300)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000340)=""/112, 0x70}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x7, {{0x2c01}, 0x0, 0x0}}], 0x58}, 0x0) 07:04:20 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:21 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x10000000000000) fstatfs(r0, &(0x7f0000000140)=""/4096) tkill(r2, 0x37) r3 = syz_open_dev$audion(&(0x7f00000011c0)='/dev/audio#\x00', 0x4, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001240)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f0000001300)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x12400}, 0xc, &(0x7f00000012c0)={&(0x7f0000001280)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="000426bd7000fbdbdf250c00000008000500000000800c0001000800020029000002000800040007100000"], 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r5 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x100000001, 0x240280) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000001140)={r1}) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) write$P9_RVERSION(r5, &(0x7f0000001340)={0x15, 0x65, 0xffff, 0x4, 0x8, '9P2000.u'}, 0x15) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)={0x6f2ba250477204f9, @broadcast, 0x4e22, 0x0, "6e710000000000000000000000000002", 0x4, 0x7fffffff, 0x54}, 0x2c) ptrace$cont(0x1f, r2, 0x0, 0x0) ioctl$KVM_IRQFD(r5, 0x4020ae76, &(0x7f0000001180)={r5, 0xff, 0x90a, r5}) ioprio_get$pid(0x1, r2) ptrace$cont(0x1f, r2, 0x5, 0x5) 07:04:21 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:21 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x6b94, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:21 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x31}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 07:04:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000240)={@multicast1, @dev={0xac, 0x14, 0x14, 0x1e}, @multicast1}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 07:04:21 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:21 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x37) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000000)=0x6) ptrace$cont(0x1f, r2, 0x0, 0x0) 07:04:21 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:21 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x6d29, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:21 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/236, 0xec}], 0x1) readv(r0, &(0x7f0000000080), 0x10000000000000a7) 07:04:21 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:21 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000140)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r2, 0xc01064b5, &(0x7f00000001c0)={&(0x7f0000000180)}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(r3, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x37) ptrace$cont(0x18, r3, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r3, 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x80, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x6, 0x1, &(0x7f0000000080), 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000180)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000200)=0x20) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000240)={r5, 0x7f}, &(0x7f0000000280)=0x8) 07:04:21 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:21 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 996.238679] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 996.247016] FAT-fs (loop5): Filesystem has been set read-only 07:04:21 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r3 = pkey_alloc(0x0, 0x2) pkey_free(r3) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x37) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={r1}) getsockopt$inet_sctp6_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000080), &(0x7f0000000140)=0x4) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x31}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) tkill(r2, 0x4) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 996.322975] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 996.373054] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 996.411448] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 07:04:24 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() ptrace$setopts(0x4206, r1, 0xfffffffffffffffd, 0x0) tkill(r1, 0x37) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) r2 = accept(r0, &(0x7f0000000140)=@sco, &(0x7f0000000000)=0x80) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000080)=0x80, 0x4) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 07:04:24 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, 0x0) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r0) 07:04:24 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r1 = dup(r0) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(0xffffffffffffffff) 07:04:24 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xbf040000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x1320af) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000000), 0x14) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 998.944504] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 998.965135] FAT-fs (loop5): Filesystem has been set read-only 07:04:24 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r1 = dup(r0) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(0xffffffffffffffff) [ 998.989714] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:04:24 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x406, r0) ioctl$UI_SET_SWBIT(r2, 0x4004556d, 0x3) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r4, 0x541b, &(0x7f0000000080)) wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0xfffffffffffffffc) r5 = semget(0x2, 0x88d948ed6f849173, 0x9c4b1f0bce0577d4) semctl$GETNCNT(r5, 0x6, 0xe, &(0x7f0000000180)=""/4096) tkill(r3, 0x37) ioctl$DRM_IOCTL_MODESET_CTL(r4, 0x40086408, &(0x7f0000001180)={0x0, 0xff}) ptrace$cont(0x18, r3, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000140)="a84ae16c731e099ce5d6e465d68191e6402008fcedb522050000000000000014c520924c24db786a7bcabbed775a61dfab77fb5bdc5aa564") ptrace$cont(0x1f, r3, 0x0, 0x0) [ 999.044857] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:04:24 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, 0x0) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r0) [ 999.085581] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 07:04:24 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0xc000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000140)={r3, 0x1, 0x6, @random="a55243eda529"}, 0x10) tkill(r1, 0x37) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 07:04:24 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r1 = dup(r0) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(0xffffffffffffffff) 07:04:24 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x39010000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:24 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102011ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x37) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x200000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x1005}}, 0x20) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000280)={0x0, @in6={{0xa, 0x4e20, 0x2, @ipv4={[], [], @broadcast}, 0x99}}}, &(0x7f0000000340)=0x84) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000380)=@assoc_value={r4, 0xb8}, 0x8) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000240)={0xb, 0x10, 0xfa00, {&(0x7f0000000140), r3}}, 0x18) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 07:04:24 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:24 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, 0x0) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r0) 07:04:24 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:24 executing program 1: r0 = socket(0x10, 0x100000003, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x14, 0x1a, 0x201}, 0x384}}, 0x0) recvmmsg(r0, &(0x7f0000002580)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 999.504898] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 999.528655] FAT-fs (loop5): Filesystem has been set read-only 07:04:24 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x37) ptrace$cont(0x18, r1, 0x400, 0x2000000000000001) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 999.572853] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:04:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) socket$inet(0x2, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x1030ce, 0x0, 0x0, 0x300) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) [ 999.615901] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 999.631232] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 07:04:24 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:24 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:27 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 07:04:27 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xdd400000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:27 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 07:04:27 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:27 executing program 1: 07:04:27 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:27 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r0) [ 1002.430902] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1002.456476] FAT-fs (loop5): Filesystem has been set read-only [ 1002.489515] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1002.510667] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) [ 1002.511489] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:04:27 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x40, 0x0) faccessat(r1, &(0x7f0000000080)='./file0\x00', 0x30, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x37) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x33}) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f00000001c0)={0x0}) ioctl$DRM_IOCTL_GET_CTX(r1, 0xc0086423, &(0x7f0000000200)={r3, 0x3}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_GET_CTX(r1, 0xc0086423, &(0x7f0000000180)={r4, 0x1}) 07:04:27 executing program 1: 07:04:27 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:27 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x9c45, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) [ 1002.773562] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1002.784507] FAT-fs (loop5): Filesystem has been set read-only [ 1002.802743] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1002.817376] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1002.828867] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 07:04:30 executing program 1: 07:04:30 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r0) 07:04:30 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:30 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x8000) r3 = fcntl$getown(r1, 0x9) prlimit64(r3, 0x2, &(0x7f0000000180)={0x7fffffff, 0x4}, &(0x7f00000001c0)) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x37) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ptrace$cont(0x1f, r4, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x4100, 0xc0) ioctl$UI_DEV_CREATE(r2, 0x5501) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) 07:04:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0x24800, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000380)={0x44, 0x0, &(0x7f00000002c0)=[@transaction={0x40406300, {0x2, 0x0, 0x4, 0x0, 0x10, 0x0, 0x0, 0x18, 0x28, &(0x7f0000000240)=[@fd={0x66642a85, 0x0, r1, 0x0, 0x2}], &(0x7f0000000280)=[0x0, 0x68, 0x0, 0x78, 0x20]}}], 0x1b, 0x0, &(0x7f0000000340)="97e66acc7543d450092dbc116558e8ffe51feb815e7d00d7975739"}) wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x37) fsetxattr$security_smack_transmute(r0, &(0x7f0000000140)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000180)='TRUE', 0x4, 0x3) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) r4 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x100000001, 0x200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x402, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r4, 0x2287, &(0x7f0000000080)=0x2f) 07:04:30 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xab03, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:30 executing program 1: 07:04:30 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:30 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) fcntl$setown(r1, 0x8, r3) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x37) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r4, 0x0, 0x0) [ 1005.414477] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1005.429481] FAT-fs (loop5): Filesystem has been set read-only 07:04:30 executing program 1: [ 1005.459667] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:04:30 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r0) [ 1005.515832] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:04:30 executing program 1: 07:04:30 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 1005.574337] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 07:04:30 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000088cff6)='/dev/ptmx\x00', 0x0, 0x0) dup2(r0, r1) writev(r1, &(0x7f00000023c0), 0x1000000000000252) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 07:04:30 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x6ebe, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:30 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 1005.830412] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1005.848996] FAT-fs (loop5): Filesystem has been set read-only [ 1005.884791] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1005.895948] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1005.911909] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 07:04:33 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) sched_rr_get_interval(r0, &(0x7f0000000000)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setopts(0xffffffffffffffff, r0, 0x8, 0x40) inotify_init1(0x800) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 07:04:33 executing program 1: getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x10, &(0x7f0000000080)=""/40, &(0x7f0000001000)=0x2) io_setup(0x8, &(0x7f0000000040)) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'vcan0\x00'}) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f00000000c0)={0xf24, 0x8}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x7}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600), 0x8) add_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000380)={'syz', 0x0}, &(0x7f0000000280)="a19dab045cb9665d489f47c55521608b0f12550f872b649dce5a3b342ab67a025095dee962ea44437b18bd4284d1c887d1915a12b31603009c193c615d4e97c8e199cdf689faeb6dcf7a9bb3436c046a9ebbc6b0b912cc3798c94f575a27515bfa88378000dac98a12dccbf95991295169b40d2d37e6e9bffdb300d1ca42da904ffd6a57675834ebb38ed01136c6967550d9a5874b5b0503524ef438f319a9639fe55e6986c65e8e047318f1f8fc3e02ad66", 0xb2, 0xfffffffffffffffe) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000140), 0x1000000000000000, 0x0) 07:04:33 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) close(r0) 07:04:33 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000001100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=""/79, 0x4f}}], 0x1, 0x0, &(0x7f0000007040)) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) writev(r1, &(0x7f00000000c0), 0x200000000000014c) 07:04:33 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x63240000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:33 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:33 executing program 1: socket$alg(0x26, 0x5, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video37\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_mount_image$bfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x3, 0x0, &(0x7f0000000100), 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) 07:04:33 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) close(r0) 07:04:33 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 1008.562298] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1008.571363] FAT-fs (loop5): Filesystem has been set read-only [ 1008.613026] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1008.684673] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1008.725443] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 07:04:34 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:34 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="0000ea2739cda39b714c24e562713c2d0d885c6726f4f60cde4f666657a6d6c34ac4580235be4ef935665803045e77b8444d7d000000000000ba548ae0f8991690c58ab2484d6c37cd6f02e925cbfa08aecc7cde9ca69c88b70a293082dcfa7b523ca6291d27b3f89dac02841e76ca57209068505222ac7806fdbd9961120c28aa23a8d6ae35c15b559bf2556539af6ce8e7aa439272d1e5fcf4d5dbd9cdd2e172aa1ed800d3242ff7eab7008418a9b803ef585f48fdff9c9f6315b7dc85d76a532a992b41d73b8ae0e893c8eed0c2b2e6c2a2cda843b23d8021625a62d2ebb4a3ec7930a37266bc1c441f92b04a0a5ebc07b25f886a6a204a4431081879bc06fe6a8c99a6879b171ad1c4c3bacd42d9712588f49861549b8519e1ff234a761c5a4844d63b93c68da6ce71dfc8f4acfaa23ed29b4456c553b2004df1e36a0ef2ecfb7291c1d9811f4039acb6a3786ff09ed092de1ff886c89de3ce949279fcd86fdf29ef39e5533a02d64f3ea9da6b6cd022c5f30db625a6d05e2b8a8184b1a178a58deff233e9d3b7b895b63c6a885ae19d4189f5"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x296d0000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) [ 1008.982119] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1008.990885] FAT-fs (loop5): Filesystem has been set read-only [ 1009.002336] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1009.019094] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1009.031886] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 07:04:36 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x10000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000180)={{0x0, 0x92}, {0x10001, 0xfe}, 0x6, 0x4, 0x83}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) write$P9_RLINK(r2, &(0x7f0000000080)={0x7, 0x47, 0x2}, 0x7) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0xffffffffffffffff, 0x0, 0x0, 0x4, 0x31}) sched_getscheduler(r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 07:04:36 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) close(r0) 07:04:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$inet(0x2, 0x0, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, 0xffffffffffffffff, 0x0, 0x1, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x15}}}}}, 0xa0) close(r1) 07:04:36 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x4c2c0000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:36 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xdd400000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:36 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:36 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7, 0x2400) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000080)=r2) r4 = dup(r0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000140)=""/111) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 07:04:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="0000ea2739cda39b714c24e562713c2d0d885c6726f4f60cde4f666657a6d6c34ac4580235be4ef935665803045e77b8444d7d000000000000ba548ae0f8991690c58ab2484d6c37cd6f02e925cbfa08aecc7cde9ca69c88b70a293082dcfa7b523ca6291d27b3f89dac02841e76ca57209068505222ac7806fdbd9961120c28aa23a8d6ae35c15b559bf2556539af6ce8e7aa439272d1e5fcf4d5dbd9cdd2e172aa1ed800d3242ff7eab7008418a9b803ef585f48fdff9c9f6315b7dc85d76a532a992b41d73b8ae0e893c8eed0c2b2e6c2a2cda843b23d8021625a62d2ebb4a3ec7930a37266bc1c441f92b04a0a5ebc07b25f886a6a204a4431081879bc06fe6a8c99a6879b171ad1c4c3bacd42d9712588f49861549b8519e1ff234a761c5a4844d63b93c68da6ce71dfc8f4acfaa23ed29b4456c553b2004df1e36a0ef2ecfb7291c1d9811f4039acb6a3786ff09ed092de1ff886c89de3ce949279fcd86fdf29ef39e5533a02d64f3ea9da6b6cd022c5f30db625a6d05e2b8a8184b1a178a58deff233e9d3b7b895b63c6a885ae19d4189f5"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xe10d, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) [ 1011.545664] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1011.561221] FAT-fs (loop5): Filesystem has been set read-only 07:04:36 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:36 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(0xffffffffffffffff) [ 1011.613076] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1011.649865] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:04:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xce22000000000000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) [ 1011.701754] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 07:04:37 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:37 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x5244, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:37 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x854d, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:37 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:37 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$inet(r1, 0x0, 0x0, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x50, &(0x7f0000000000), &(0x7f0000000140)=0x30) syz_mount_image$f2fs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x9, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) [ 1012.066112] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1012.080227] FAT-fs (loop5): Filesystem has been set read-only 07:04:37 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vga_arbiter\x00', 0x2101, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x100000f, 0x10, r0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000080)={0x9, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) ioctl$VIDIOC_G_STD(r1, 0x80085617, &(0x7f0000000000)=0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r1, 0xc040564a, &(0x7f00000001c0)={0xffffffffffffff81, 0x5, 0x100d, 0x3, 0x8000, 0x6, 0x3ff, 0x1}) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f0000000180)=r2) r3 = accept(0xffffffffffffffff, &(0x7f0000000280)=@pppoe={0x18, 0x0, {0x0, @random}}, &(0x7f0000000300)=0x80) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r3, 0x10e, 0x8, &(0x7f00000004c0)=0x8000, 0x4) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000340)=@assoc_value={0x0, 0x4}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f00000003c0)={r4, @in6={{0xa, 0x4e21, 0x2, @mcast1, 0x7}}}, &(0x7f0000000480)=0x84) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r0, 0x50, &(0x7f0000000540)}, 0x10) ioctl$KVM_GET_ONE_REG(r5, 0x4010aeab, &(0x7f0000000240)={0x2, 0x5}) 07:04:37 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 1012.127591] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1012.232125] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 07:04:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000140)={{0x3, 0x6, 0x4, 0x101, '\x00', 0xa80a}, 0x3, 0x8, 0xffffffff80000001, r0, 0x1, 0x80000000000, 'syz1\x00', &(0x7f0000000080)=['cgroupkeyring/user\x00'], 0x13, [], [0xfffffffffffff800, 0x100, 0x7fffffff, 0x9]}) ptrace$cont(0x1f, r0, 0x0, 0x0) 07:04:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x7e090000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:39 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xc6080000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:39 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:39 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$inet(r1, 0x0, 0x0, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x50, &(0x7f0000000000), &(0x7f0000000140)=0x30) syz_mount_image$f2fs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x9, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="0000ea2739cda39b714c24e562713c2d0d885c6726f4f60cde4f666657a6d6c34ac4580235be4ef935665803045e77b8444d7d000000000000ba548ae0f8991690c58ab2484d6c37cd6f02e925cbfa08aecc7cde9ca69c88b70a293082dcfa7b523ca6291d27b3f89dac02841e76ca57209068505222ac7806fdbd9961120c28aa23a8d6ae35c15b559bf2556539af6ce8e7aa439272d1e5fcf4d5dbd9cdd2e172aa1ed800d3242ff7eab7008418a9b803ef585f48fdff9c9f6315b7dc85d76a532a992b41d73b8ae0e893c8eed0c2b2e6c2a2cda843b23d8021625a62d2ebb4a3ec7930a37266bc1c441f92b04a0a5ebc07b25f886a6a204a4431081879bc06fe6a8c99a6879b171ad1c4c3bacd42d9712588f49861549b8519e1ff234a761c5a4844d63b93c68da6ce71dfc8f4acfaa23ed29b4456c553b2004df1e36a0ef2ecfb7291c1d9811f4039acb6a3786ff09ed092de1ff886c89de3ce949279fcd86fdf29ef39e5533a02d64f3ea9da6b6cd022c5f30db625a6d05e2b8a8184b1a178a58deff233e9d3b7b895b63c6a885ae19d4189f5"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x67110000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:40 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x130b, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:40 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x16620000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:40 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xb33d000000000000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xb01, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:40 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 1015.026596] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1015.034590] FAT-fs (loop3): Filesystem has been set read-only [ 1015.134702] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) [ 1015.316077] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1015.330351] FAT-fs (loop2): Filesystem has been set read-only [ 1015.352097] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) 07:04:42 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x10, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:42 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:42 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xb01000000000000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:42 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xc20b0000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:42 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x7053, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:43 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:43 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 1017.887233] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1017.948242] FAT-fs (loop5): Filesystem has been set read-only 07:04:43 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:43 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 1018.013842] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:04:43 executing program 1 (fault-call:9 fault-nth:0): mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 1018.097246] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:04:43 executing program 2 (fault-call:8 fault-nth:0): clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1018.148020] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 07:04:43 executing program 0 (fault-call:7 fault-nth:0): syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:43 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:43 executing program 3: ioctl$VIDIOC_G_FMT(0xffffffffffffffff, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:43 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xff0f000000000000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:43 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 07:04:43 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:43 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:43 executing program 3: ioctl$VIDIOC_G_FMT(0xffffffffffffffff, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) [ 1018.683384] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:04:44 executing program 3: ioctl$VIDIOC_G_FMT(0xffffffffffffffff, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) [ 1018.737470] FAT-fs (loop5): Filesystem has been set read-only 07:04:44 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x5421, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:44 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 1018.821563] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1018.869427] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1018.886086] FAULT_INJECTION: forcing a failure. [ 1018.886086] name failslab, interval 1, probability 0, space 0, times 0 [ 1018.907669] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1018.910448] FAT-fs (loop0): Filesystem has been set read-only [ 1018.944764] CPU: 1 PID: 30678 Comm: syz-executor0 Not tainted 4.20.0-rc5+ #142 [ 1018.952155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1018.961519] Call Trace: [ 1018.964715] dump_stack+0x244/0x39d [ 1018.968374] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1018.968727] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) [ 1018.973579] ? mark_held_locks+0xc7/0x130 [ 1018.973604] should_fail.cold.4+0xa/0x17 [ 1018.973621] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1018.973642] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1018.973657] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1018.973672] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1018.973694] ? zap_class+0x640/0x640 [ 1019.012467] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1019.017218] ? retint_kernel+0x2d/0x2d [ 1019.021111] ? __lock_is_held+0xb5/0x140 [ 1019.025175] ? perf_trace_sched_process_exec+0x860/0x860 [ 1019.030623] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 1019.036188] __should_failslab+0x124/0x180 [ 1019.040416] should_failslab+0x9/0x14 [ 1019.044210] kmem_cache_alloc_trace+0x2d7/0x750 [ 1019.048889] alloc_pipe_info+0x164/0x5d0 [ 1019.052946] ? pipe_read+0x940/0x940 [ 1019.056656] ? ksys_dup3+0x680/0x680 [ 1019.060366] ? find_held_lock+0x36/0x1c0 [ 1019.065039] splice_direct_to_actor+0x6fc/0x8f0 [ 1019.069704] ? zap_class+0x640/0x640 [ 1019.073429] ? pipe_to_sendpage+0x400/0x400 [ 1019.077763] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1019.083291] ? do_splice_to+0x190/0x190 [ 1019.087264] ? security_file_permission+0x1c2/0x220 [ 1019.092284] ? rw_verify_area+0x118/0x360 [ 1019.096425] do_splice_direct+0x2d4/0x420 [ 1019.100566] ? splice_direct_to_actor+0x8f0/0x8f0 [ 1019.105406] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1019.110939] ? __sb_start_write+0x1b2/0x370 [ 1019.115260] do_sendfile+0x62a/0xe20 [ 1019.118970] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1019.123550] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1019.129077] ? _copy_from_user+0xdf/0x150 [ 1019.133223] __x64_sys_sendfile64+0x15d/0x250 [ 1019.137716] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1019.142310] do_syscall_64+0x1b9/0x820 [ 1019.146185] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1019.151542] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1019.156461] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1019.161299] ? trace_hardirqs_on_caller+0x310/0x310 [ 1019.166949] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1019.171957] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1019.176797] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1019.181984] RIP: 0033:0x457569 [ 1019.185171] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1019.204073] RSP: 002b:00007ff1db808c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1019.211768] RAX: ffffffffffffffda RBX: 00007ff1db808c90 RCX: 0000000000457569 [ 1019.219025] RDX: 0000000020000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 1019.226282] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1019.233539] R10: 00008080fffffffe R11: 0000000000000246 R12: 00007ff1db8096d4 07:04:44 executing program 3: r0 = syz_open_dev$video(0x0, 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) [ 1019.240800] R13: 00000000004c3c2a R14: 00000000004d6230 R15: 0000000000000006 [ 1019.258993] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) 07:04:44 executing program 0 (fault-call:7 fault-nth:1): syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:44 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x5009000000000000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:44 executing program 3: r0 = syz_open_dev$video(0x0, 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:44 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 1019.508477] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1019.537116] FAT-fs (loop5): Filesystem has been set read-only [ 1019.569122] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1019.588036] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1019.596721] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) [ 1019.597324] FAULT_INJECTION: forcing a failure. [ 1019.597324] name failslab, interval 1, probability 0, space 0, times 0 [ 1019.622678] CPU: 1 PID: 30723 Comm: syz-executor0 Not tainted 4.20.0-rc5+ #142 [ 1019.630079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1019.639442] Call Trace: [ 1019.642055] dump_stack+0x244/0x39d [ 1019.645699] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1019.650907] should_fail.cold.4+0xa/0x17 [ 1019.650929] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1019.650955] ? save_stack+0x43/0xd0 [ 1019.650969] ? kasan_kmalloc+0xc7/0xe0 [ 1019.650982] ? kmem_cache_alloc_trace+0x152/0x750 [ 1019.650998] ? alloc_pipe_info+0x164/0x5d0 [ 1019.660144] ? zap_class+0x640/0x640 [ 1019.660161] ? __x64_sys_sendfile64+0x15d/0x250 [ 1019.660176] ? do_syscall_64+0x1b9/0x820 [ 1019.660191] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1019.660212] ? find_held_lock+0x36/0x1c0 [ 1019.660231] ? __lock_is_held+0xb5/0x140 [ 1019.660337] ? tcp_v6_md5_hash_headers.isra.20+0x658/0x670 [ 1019.669231] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1019.672901] ? perf_trace_sched_process_exec+0x860/0x860 [ 1019.672930] __should_failslab+0x124/0x180 [ 1019.672950] should_failslab+0x9/0x14 [ 1019.672962] __kmalloc+0x2e0/0x760 [ 1019.672980] ? kmem_cache_alloc_trace+0x353/0x750 [ 1019.682758] FAT-fs (loop0): Filesystem has been set read-only [ 1019.685574] ? alloc_pipe_info+0x2ce/0x5d0 [ 1019.685595] alloc_pipe_info+0x2ce/0x5d0 [ 1019.685613] ? pipe_read+0x940/0x940 [ 1019.685636] ? ksys_dup3+0x680/0x680 [ 1019.759934] ? mark_held_locks+0xc7/0x130 [ 1019.764082] splice_direct_to_actor+0x6fc/0x8f0 [ 1019.768749] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1019.773328] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1019.778839] ? pipe_to_sendpage+0x400/0x400 [ 1019.783164] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1019.787919] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1019.793472] ? do_splice_to+0x190/0x190 [ 1019.797443] ? security_file_permission+0x1c2/0x220 [ 1019.802461] ? rw_verify_area+0x118/0x360 [ 1019.806597] do_splice_direct+0x2d4/0x420 [ 1019.810740] ? splice_direct_to_actor+0x8f0/0x8f0 [ 1019.815619] do_sendfile+0x62a/0xe20 [ 1019.819325] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1019.823904] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1019.829428] ? _copy_from_user+0xdf/0x150 [ 1019.833576] __x64_sys_sendfile64+0x15d/0x250 [ 1019.838065] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1019.842644] do_syscall_64+0x1b9/0x820 [ 1019.846532] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1019.851885] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1019.856803] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1019.861631] ? trace_hardirqs_on_caller+0x310/0x310 [ 1019.866634] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1019.871640] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1019.876483] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1019.881657] RIP: 0033:0x457569 [ 1019.884844] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1019.903731] RSP: 002b:00007ff1db808c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1019.911431] RAX: ffffffffffffffda RBX: 00007ff1db808c90 RCX: 0000000000457569 [ 1019.918685] RDX: 0000000020000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 1019.925938] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1019.933203] R10: 00008080fffffffe R11: 0000000000000246 R12: 00007ff1db8096d4 [ 1019.940463] R13: 00000000004c3c2a R14: 00000000004d6230 R15: 0000000000000006 [ 1019.950451] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) 07:04:46 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x930000, 0x0) 07:04:46 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0xaf01, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:46 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:46 executing program 3: r0 = syz_open_dev$video(0x0, 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:46 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x53700000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:46 executing program 0 (fault-call:7 fault-nth:2): syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="0000ea2739cda39b714c24e562713c2d0d885c6726f4f60cde4f666657a6d6c34ac4580235be4ef935665803045e77b8444d7d000000000000ba548ae0f8991690c58ab2484d6c37cd6f02e925cbfa08aecc7cde9ca69c88b70a293082dcfa7b523ca6291d27b3f89dac02841e76ca57209068505222ac7806fdbd9961120c28aa23a8d6ae35c15b559bf2556539af6ce8e7aa439272d1e5fcf4d5dbd9cdd2e172aa1ed800d3242ff7eab7008418a9b803ef585f48fdff9c9f6315b7dc85d76a532a992b41d73b8ae0e893c8eed0c2b2e6c2a2cda843b23d8021625a62d2ebb4a3ec7930a37266bc1c441f92b04a0a5ebc07b25f886a6a204a4431081879bc06fe6a8c99a6879b171ad1c4c3bacd42d9712588f49861549b8519e1ff234a761c5a4844d63b93c68da6ce71dfc8f4acfaa23ed29b4456c553b2004df1e36a0ef2ecfb7291c1d9811f4039acb6a3786ff09ed092de1ff886c89de3ce949279fcd86fdf29ef39e5533a02d64f3ea9da6b6cd022c5f30db625a6d05e2b8a8184b1a178a58deff233e9d3b7b895b63c6a885ae19d4189f5"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:47 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:47 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 1021.768798] FAULT_INJECTION: forcing a failure. [ 1021.768798] name failslab, interval 1, probability 0, space 0, times 0 [ 1021.778047] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1021.804943] FAT-fs (loop5): Filesystem has been set read-only [ 1021.842829] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1021.877312] CPU: 1 PID: 30750 Comm: syz-executor0 Not tainted 4.20.0-rc5+ #142 [ 1021.884910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1021.888329] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1021.894973] Call Trace: [ 1021.895001] dump_stack+0x244/0x39d [ 1021.895024] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1021.895109] ? __kernel_text_address+0xd/0x40 [ 1021.895135] should_fail.cold.4+0xa/0x17 [ 1021.895158] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1021.895183] ? save_stack+0x43/0xd0 [ 1021.895197] ? kasan_kmalloc+0xc7/0xe0 [ 1021.895209] ? kmem_cache_alloc_trace+0x152/0x750 [ 1021.895226] ? alloc_pipe_info+0x164/0x5d0 [ 1021.908321] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) [ 1021.909315] ? zap_class+0x640/0x640 [ 1021.909333] ? __x64_sys_sendfile64+0x15d/0x250 [ 1021.909346] ? do_syscall_64+0x1b9/0x820 [ 1021.909364] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1021.928171] ? find_held_lock+0x36/0x1c0 [ 1021.935660] ? __lock_is_held+0xb5/0x140 [ 1021.935692] ? perf_trace_sched_process_exec+0x860/0x860 [ 1021.935718] __should_failslab+0x124/0x180 [ 1021.935738] should_failslab+0x9/0x14 07:04:47 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x9104000000000000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:47 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) [ 1021.992211] __kmalloc+0x2e0/0x760 [ 1021.993185] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1021.995756] ? kmem_cache_alloc_trace+0x353/0x750 [ 1021.995772] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1021.995787] ? rcu_softirq_qs+0x20/0x20 [ 1021.995803] ? alloc_pipe_info+0x2ce/0x5d0 [ 1021.995822] alloc_pipe_info+0x2ce/0x5d0 [ 1022.003813] FAT-fs (loop0): Filesystem has been set read-only [ 1022.008447] ? pipe_read+0x940/0x940 [ 1022.008471] ? ksys_dup3+0x680/0x680 [ 1022.008503] ? find_held_lock+0x36/0x1c0 07:04:47 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) [ 1022.008521] splice_direct_to_actor+0x6fc/0x8f0 [ 1022.008538] ? zap_class+0x640/0x640 [ 1022.051716] ? pipe_to_sendpage+0x400/0x400 [ 1022.056052] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1022.061607] ? do_splice_to+0x190/0x190 [ 1022.065587] ? security_file_permission+0x1c2/0x220 [ 1022.070612] ? rw_verify_area+0x118/0x360 [ 1022.074775] do_splice_direct+0x2d4/0x420 [ 1022.074796] ? splice_direct_to_actor+0x8f0/0x8f0 [ 1022.074820] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 07:04:47 executing program 3: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(0xffffffffffffffff, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) [ 1022.074837] ? __sb_start_write+0x1b2/0x370 [ 1022.074855] do_sendfile+0x62a/0xe20 [ 1022.083844] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1022.083870] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1022.083886] ? _copy_from_user+0xdf/0x150 [ 1022.083908] __x64_sys_sendfile64+0x15d/0x250 [ 1022.083926] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1022.083954] do_syscall_64+0x1b9/0x820 [ 1022.083969] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1022.083990] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1022.135703] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1022.140563] ? trace_hardirqs_on_caller+0x310/0x310 [ 1022.145596] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1022.150628] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1022.155501] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1022.160698] RIP: 0033:0x457569 [ 1022.163899] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1022.182801] RSP: 002b:00007ff1db808c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 07:04:47 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x730000, 0x0) [ 1022.182817] RAX: ffffffffffffffda RBX: 00007ff1db808c90 RCX: 0000000000457569 [ 1022.182826] RDX: 0000000020000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 1022.182834] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1022.182846] R10: 00008080fffffffe R11: 0000000000000246 R12: 00007ff1db8096d4 [ 1022.198105] R13: 00000000004c3c2a R14: 00000000004d6230 R15: 0000000000000006 [ 1022.205958] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) 07:04:47 executing program 3: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(0xffffffffffffffff, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:47 executing program 0 (fault-call:7 fault-nth:3): syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:47 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x2, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:47 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:47 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0xfeffffff00000000, 0x0) 07:04:47 executing program 3: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(0xffffffffffffffff, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:47 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0xfeffffff, 0x0) [ 1022.495678] FAULT_INJECTION: forcing a failure. [ 1022.495678] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1022.548428] CPU: 0 PID: 30815 Comm: syz-executor0 Not tainted 4.20.0-rc5+ #142 [ 1022.555852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1022.565210] Call Trace: [ 1022.567819] dump_stack+0x244/0x39d [ 1022.571476] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1022.576696] should_fail.cold.4+0xa/0x17 [ 1022.580785] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1022.585901] ? zap_class+0x640/0x640 [ 1022.589628] ? find_held_lock+0x36/0x1c0 [ 1022.594001] ? zap_class+0x640/0x640 [ 1022.597736] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1022.602499] ? retint_kernel+0x2d/0x2d [ 1022.606379] ? __lock_is_held+0xb5/0x140 [ 1022.610434] ? lock_release+0xa00/0xa00 [ 1022.614408] ? perf_trace_sched_process_exec+0x860/0x860 [ 1022.619862] ? __might_sleep+0x95/0x190 [ 1022.623845] __alloc_pages_nodemask+0x366/0xea0 [ 1022.628511] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 1022.633513] ? mark_held_locks+0xc7/0x130 [ 1022.637663] ? mark_held_locks+0xc7/0x130 [ 1022.641821] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1022.646503] ? retint_kernel+0x2d/0x2d [ 1022.650391] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1022.655313] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1022.660066] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1022.665518] ? print_usage_bug+0xc0/0xc0 [ 1022.669580] ? retint_kernel+0x2d/0x2d [ 1022.673481] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1022.679036] alloc_pages_current+0x173/0x350 [ 1022.683491] __page_cache_alloc+0x38c/0x5c0 [ 1022.687830] ? retint_kernel+0x2d/0x2d [ 1022.692243] ? generic_perform_write+0x6a0/0x6a0 [ 1022.692264] ? pagecache_get_page+0x745/0xf00 [ 1022.692289] pagecache_get_page+0x396/0xf00 [ 1022.701519] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1022.701540] ? add_to_page_cache_lru+0xdb0/0xdb0 [ 1022.701556] ? zap_class+0x640/0x640 [ 1022.701579] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1022.701599] ? check_preemption_disabled+0x48/0x280 [ 1022.729723] ? __lock_is_held+0xb5/0x140 [ 1022.733781] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1022.738789] ? __mark_inode_dirty+0x4b2/0x1510 [ 1022.743360] ? print_usage_bug+0xc0/0xc0 [ 1022.747409] ? __inode_attach_wb+0x13f0/0x13f0 [ 1022.751995] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1022.752853] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1022.757541] ? check_preemption_disabled+0x48/0x280 [ 1022.765414] FAT-fs (loop0): Filesystem has been set read-only [ 1022.770332] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1022.770352] ? balance_dirty_pages_ratelimited+0x1f7/0x2370 [ 1022.770369] ? buffer_io_error+0xa0/0xa0 [ 1022.770397] grab_cache_page_write_begin+0x6f/0xa0 [ 1022.796158] block_write_begin+0xae/0x370 [ 1022.800295] ? fat_add_cluster+0x160/0x160 [ 1022.804575] ? __block_write_begin+0x40/0x40 [ 1022.808986] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1022.814433] ? __block_commit_write.isra.37+0x1cb/0x3f0 [ 1022.819787] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1022.825332] cont_write_begin+0x5ba/0x920 [ 1022.829469] ? fat_add_cluster+0x160/0x160 [ 1022.833701] ? block_write_begin+0x370/0x370 [ 1022.838100] ? iov_iter_advance+0x306/0x13f0 [ 1022.842499] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1022.848027] ? iov_iter_fault_in_readable+0x22a/0x450 [ 1022.853207] ? _copy_from_iter_flushcache+0xfc0/0xfc0 [ 1022.858389] fat_write_begin+0x8d/0x120 [ 1022.862363] ? fat_add_cluster+0x160/0x160 [ 1022.866601] generic_perform_write+0x3aa/0x6a0 [ 1022.871176] ? add_page_wait_queue+0x400/0x400 [ 1022.875759] ? current_time+0x1b0/0x1b0 [ 1022.879722] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1022.884496] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1022.889511] ? generic_write_check_limits+0x28d/0x370 [ 1022.894713] __generic_file_write_iter+0x26e/0x630 [ 1022.899998] generic_file_write_iter+0x34d/0x6b0 [ 1022.904749] ? __generic_file_write_iter+0x630/0x630 [ 1022.909841] ? iov_iter_init+0x16a/0x210 [ 1022.913897] ? iov_iter_init+0x192/0x210 [ 1022.917956] ? iov_iter_init+0xe5/0x210 [ 1022.921921] __vfs_write+0x6b8/0x9f0 [ 1022.925623] ? kernel_read+0x120/0x120 [ 1022.929509] ? __lock_is_held+0xb5/0x140 [ 1022.933557] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1022.938314] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1022.943840] __kernel_write+0x10c/0x370 [ 1022.947806] write_pipe_buf+0x180/0x240 [ 1022.951768] ? do_splice_direct+0x420/0x420 [ 1022.956075] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1022.961593] ? splice_from_pipe_next.part.11+0x296/0x340 [ 1022.967031] __splice_from_pipe+0x38b/0x7c0 [ 1022.971339] ? do_splice_direct+0x420/0x420 [ 1022.975664] splice_from_pipe+0x1ec/0x340 [ 1022.979815] ? do_splice_direct+0x420/0x420 [ 1022.984120] ? splice_shrink_spd+0xd0/0xd0 [ 1022.988348] default_file_splice_write+0x3c/0x90 [ 1022.993090] ? generic_splice_sendpage+0x50/0x50 [ 1022.997945] direct_splice_actor+0x128/0x190 [ 1023.002356] splice_direct_to_actor+0x318/0x8f0 [ 1023.007027] ? pipe_to_sendpage+0x400/0x400 [ 1023.011337] ? do_splice_to+0x190/0x190 [ 1023.015825] ? pipe_to_sendpage+0x400/0x400 [ 1023.020544] do_splice_direct+0x2d4/0x420 [ 1023.024704] ? splice_direct_to_actor+0x8f0/0x8f0 [ 1023.029538] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1023.035062] ? __sb_start_write+0x1b2/0x370 [ 1023.039383] do_sendfile+0x62a/0xe20 [ 1023.043096] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1023.047678] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1023.053217] ? _copy_from_user+0xdf/0x150 [ 1023.057359] __x64_sys_sendfile64+0x15d/0x250 [ 1023.061841] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1023.066433] do_syscall_64+0x1b9/0x820 [ 1023.070310] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1023.075661] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1023.080583] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1023.085419] ? trace_hardirqs_on_caller+0x310/0x310 [ 1023.090444] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1023.095990] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1023.101006] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1023.105841] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1023.111016] RIP: 0033:0x457569 [ 1023.114197] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1023.133444] RSP: 002b:00007ff1db808c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1023.141139] RAX: ffffffffffffffda RBX: 00007ff1db808c90 RCX: 0000000000457569 [ 1023.148410] RDX: 0000000020000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 1023.155675] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1023.162928] R10: 00008080fffffffe R11: 0000000000000246 R12: 00007ff1db8096d4 [ 1023.170182] R13: 00000000004c3c2a R14: 00000000004d6230 R15: 0000000000000006 [ 1023.189381] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) 07:04:48 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x2616000000000000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:48 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x507000, 0x0) 07:04:48 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, 0x0) 07:04:48 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 1023.200789] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) [ 1023.210070] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) 07:04:48 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x40049409, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:48 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x7fffffffefff, 0x0) 07:04:48 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:48 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, 0x0) [ 1023.253836] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) 07:04:48 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:48 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, 0x0) 07:04:48 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x70500000000000, 0x0) 07:04:48 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0xc0189436, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 1023.504698] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1023.526544] FAT-fs (loop5): Filesystem has been set read-only [ 1023.575686] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1023.601948] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) [ 1023.612681] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:04:48 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x890a000000000000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:48 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:48 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x0, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:48 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0xff600000, 0x0) 07:04:48 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x5452, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:49 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x0, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:49 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x7a0c000000000000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:49 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:49 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x0, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:49 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x60ff, 0x0) 07:04:49 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0xc020660b, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xc25b0000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:49 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="0000ea2739cda39b714c24e562713c2d0d885c6726f4f60cde4f666657a6d6c34ac4580235be4ef935665803045e77b8444d7d000000000000ba548ae0f8991690c58ab2484d6c37cd6f02e925cbfa08aecc7cde9ca69c88b70a293082dcfa7b523ca6291d27b3f89dac02841e76ca57209068505222ac7806fdbd9961120c28aa23a8d6ae35c15b559bf2556539af6ce8e7aa439272d1e5fcf4d5dbd9cdd2e172aa1ed800d3242ff7eab7008418a9b803ef585f48fdff9c9f6315b7dc85d76a532a992b41d73b8ae0e893c8eed0c2b2e6c2a2cda843b23d8021625a62d2ebb4a3ec7930a37266bc1c441f92b04a0a5ebc07b25f886a6a204a4431081879bc06fe6a8c99a6879b171ad1c4c3bacd42d9712588f49861549b8519e1ff234a761c5a4844d63b93c68da6ce71dfc8f4acfaa23ed29b4456c553b2004df1e36a0ef2ecfb7291c1d9811f4039acb6a3786ff09ed092de1ff886c89de3ce949279fcd86fdf29ef39e5533a02d64f3ea9da6b6cd022c5f30db625a6d05e2b8a8184b1a178a58deff233e9d3b7b895b63c6a885ae19d4189f5"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x53700000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:49 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x400000000000, 0x0) 07:04:49 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 1024.433112] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:04:49 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0xc0045878, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 1024.486677] FAT-fs (loop5): Filesystem has been set read-only 07:04:49 executing program 3 (fault-call:1 fault-nth:0): r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:49 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 1024.591017] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1024.600060] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1024.634708] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1024.641519] FAT-fs (loop0): Filesystem has been set read-only [ 1024.673278] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) [ 1024.710483] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1024.731676] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1024.758188] FAULT_INJECTION: forcing a failure. [ 1024.758188] name failslab, interval 1, probability 0, space 0, times 0 [ 1024.765550] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) [ 1024.775018] CPU: 1 PID: 30987 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #142 [ 1024.784245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1024.793613] Call Trace: [ 1024.796944] dump_stack+0x244/0x39d [ 1024.800595] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1024.805797] ? __lock_acquire+0x62f/0x4c20 [ 1024.810032] ? zap_class+0x640/0x640 [ 1024.813743] should_fail.cold.4+0xa/0x17 [ 1024.817800] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1024.822893] ? print_usage_bug+0xc0/0xc0 [ 1024.826959] ? find_held_lock+0x36/0x1c0 [ 1024.831031] ? perf_trace_sched_process_exec+0x860/0x860 [ 1024.836469] ? mark_held_locks+0x130/0x130 [ 1024.840696] ? __lock_acquire+0x62f/0x4c20 [ 1024.844923] __should_failslab+0x124/0x180 [ 1024.849150] should_failslab+0x9/0x14 [ 1024.852942] kmem_cache_alloc_node_trace+0x270/0x740 [ 1024.858035] ? zap_class+0x640/0x640 [ 1024.861747] __kmalloc_node+0x3c/0x70 [ 1024.865539] kvmalloc_node+0x65/0xf0 [ 1024.869247] video_usercopy+0x35c/0x1760 [ 1024.873311] ? v4l_s_fmt+0x990/0x990 [ 1024.877016] ? _parse_integer+0x180/0x180 [ 1024.881163] ? v4l_enumstd+0x70/0x70 [ 1024.884873] ? find_held_lock+0x36/0x1c0 [ 1024.888930] ? __fget+0x4aa/0x740 [ 1024.892374] ? lock_downgrade+0x900/0x900 [ 1024.897275] ? check_preemption_disabled+0x48/0x280 [ 1024.902286] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1024.907211] ? smk_access+0x53b/0x700 [ 1024.911001] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1024.916281] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1024.921807] ? smack_log+0x423/0x590 [ 1024.925529] ? smk_access_entry+0x310/0x310 [ 1024.929842] ? __fget+0x4d1/0x740 [ 1024.933297] ? smk_tskacc+0x3dd/0x520 [ 1024.937091] ? video_usercopy+0x1760/0x1760 [ 1024.941404] video_ioctl2+0x2c/0x33 [ 1024.945024] v4l2_ioctl+0x154/0x1b0 [ 1024.948641] ? video_devdata+0xa0/0xa0 [ 1024.952520] do_vfs_ioctl+0x1de/0x1790 [ 1024.956398] ? __lock_is_held+0xb5/0x140 [ 1024.960454] ? ioctl_preallocate+0x300/0x300 [ 1024.964855] ? smk_curacc+0x7f/0xa0 [ 1024.968472] ? smack_file_ioctl+0x210/0x3c0 [ 1024.972781] ? fget_raw+0x20/0x20 [ 1024.976225] ? smack_file_lock+0x2e0/0x2e0 [ 1024.980469] ? fput+0x130/0x1a0 [ 1024.983738] ? do_syscall_64+0x9a/0x820 [ 1024.987702] ? do_syscall_64+0x9a/0x820 [ 1024.991670] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1024.997952] ? security_file_ioctl+0x94/0xc0 [ 1025.002356] ksys_ioctl+0xa9/0xd0 [ 1025.005806] __x64_sys_ioctl+0x73/0xb0 [ 1025.009686] do_syscall_64+0x1b9/0x820 [ 1025.013566] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1025.018922] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1025.023842] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1025.028679] ? trace_hardirqs_on_caller+0x310/0x310 [ 1025.033688] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1025.038694] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1025.043706] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1025.048540] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1025.053716] RIP: 0033:0x457569 [ 1025.056903] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1025.075789] RSP: 002b:00007f22ad234c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1025.083483] RAX: ffffffffffffffda RBX: 00007f22ad234c90 RCX: 0000000000457569 [ 1025.090741] RDX: 0000000020000080 RSI: 00000000c0d05604 RDI: 0000000000000003 [ 1025.098709] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1025.105966] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f22ad2356d4 [ 1025.113220] R13: 00000000004c1b8f R14: 00000000004d2f90 R15: 0000000000000004 07:04:50 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xe10d0000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:50 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x60ffffffffff, 0x0) 07:04:50 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xffffffff000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:50 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:50 executing program 3 (fault-call:1 fault-nth:1): r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:50 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x5451, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:50 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x4000, 0x0) 07:04:50 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:50 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:50 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af30, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:50 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xce02000000000000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) [ 1025.464936] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1025.488229] FAT-fs (loop0): Filesystem has been set read-only 07:04:50 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x607000, 0x0) [ 1025.534278] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1025.552000] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:04:50 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xb70a, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:50 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0045878, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) [ 1025.578606] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) 07:04:50 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:51 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0189436, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:51 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0xaf02, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:51 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x9501000000000000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:51 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x7300, 0x0) 07:04:51 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05667, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:51 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x3f00000000000000, 0x0) 07:04:51 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="0000ea2739cda39b714c24e562713c2d0d885c6726f4f60cde4f666657a6d6c34ac4580235be4ef935665803045e77b8444d7d000000000000ba548ae0f8991690c58ab2484d6c37cd6f02e925cbfa08aecc7cde9ca69c88b70a293082dcfa7b523ca6291d27b3f89dac02841e76ca57209068505222ac7806fdbd9961120c28aa23a8d6ae35c15b559bf2556539af6ce8e7aa439272d1e5fcf4d5dbd9cdd2e172aa1ed800d3242ff7eab7008418a9b803ef585f48fdff9c9f6315b7dc85d76a532a992b41d73b8ae0e893c8eed0c2b2e6c2a2cda843b23d8021625a62d2ebb4a3ec7930a37266bc1c441f92b04a0a5ebc07b25f886a6a204a4431081879bc06fe6a8c99a6879b171ad1c4c3bacd42d9712588f49861549b8519e1ff234a761c5a4844d63b93c68da6ce71dfc8f4acfaa23ed29b4456c553b2004df1e36a0ef2ecfb7291c1d9811f4039acb6a3786ff09ed092de1ff886c89de3ce949279fcd86fdf29ef39e5533a02d64f3ea9da6b6cd022c5f30db625a6d05e2b8a8184b1a178a58deff233e9d3b7b895b63c6a885ae19d4189f5"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x3f00, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:51 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:51 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0045878, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:51 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af00, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 1026.085584] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:04:51 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc058565d, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:51 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0xf07000, 0x0) [ 1026.131784] FAT-fs (loop5): Filesystem has been set read-only [ 1026.181486] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:04:51 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0x5421, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:51 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x3f00, 0x0) [ 1026.252041] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1026.278241] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 07:04:51 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="0000ea2739cda39b714c24e562713c2d0d885c6726f4f60cde4f666657a6d6c34ac4580235be4ef935665803045e77b8444d7d000000000000ba548ae0f8991690c58ab2484d6c37cd6f02e925cbfa08aecc7cde9ca69c88b70a293082dcfa7b523ca6291d27b3f89dac02841e76ca57209068505222ac7806fdbd9961120c28aa23a8d6ae35c15b559bf2556539af6ce8e7aa439272d1e5fcf4d5dbd9cdd2e172aa1ed800d3242ff7eab7008418a9b803ef585f48fdff9c9f6315b7dc85d76a532a992b41d73b8ae0e893c8eed0c2b2e6c2a2cda843b23d8021625a62d2ebb4a3ec7930a37266bc1c441f92b04a0a5ebc07b25f886a6a204a4431081879bc06fe6a8c99a6879b171ad1c4c3bacd42d9712588f49861549b8519e1ff234a761c5a4844d63b93c68da6ce71dfc8f4acfaa23ed29b4456c553b2004df1e36a0ef2ecfb7291c1d9811f4039acb6a3786ff09ed092de1ff886c89de3ce949279fcd86fdf29ef39e5533a02d64f3ea9da6b6cd022c5f30db625a6d05e2b8a8184b1a178a58deff233e9d3b7b895b63c6a885ae19d4189f5"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xca05, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:51 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:51 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x463, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:51 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x400000, 0x0) 07:04:51 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0x5450, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:51 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x8008af26, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:51 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc058560f, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:51 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:52 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x70f000, 0x0) [ 1026.740514] FAT-fs (loop5): invalid media value (0x37) 07:04:52 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4020940d, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:52 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x2463, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) [ 1026.780400] FAT-fs (loop5): Can't find a valid FAT filesystem 07:04:52 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0205649, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:52 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xa80c, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:52 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0xffffffff00000000, 0x0) 07:04:52 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0x2, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:52 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, 0x0) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r0) 07:04:52 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x5450, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:52 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc020660b, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) [ 1027.184405] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1027.202395] FAT-fs (loop0): Filesystem has been set read-only 07:04:52 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x60700000000000, 0x0) [ 1027.246848] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:04:52 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, 0x0) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r0) 07:04:52 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0285629, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:52 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0xc0045878, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 1027.333611] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1027.381607] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) 07:04:52 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x946b000000000000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:52 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xb72a, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:52 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x930000000000, 0x0) 07:04:52 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0205647, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:52 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x5460, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:52 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, 0x0) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r0) 07:04:52 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0x40049409, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:53 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x705000, 0x0) [ 1027.687771] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:04:53 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x7f51010000000000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:53 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0585609, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) [ 1027.747297] FAT-fs (loop0): Filesystem has been set read-only 07:04:53 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x8008af00, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 1027.812765] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1027.823173] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1027.869391] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) 07:04:53 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0xffffffffff600000, 0x0) 07:04:53 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x7000000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:53 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0585611, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) [ 1027.925946] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1027.953942] FAT-fs (loop5): Filesystem has been set read-only 07:04:53 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 1028.021344] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1028.036504] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1028.045006] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 07:04:53 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)={0xfffffdfd}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:53 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xaf50000000000000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:53 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0x5451, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:53 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0xfffffffe, 0x0) 07:04:53 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0x5452, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:53 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:53 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0xf0700000000000, 0x0) 07:04:53 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xdd000000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:53 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0x4020940d, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:53 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)={0xfdfdffff00000000}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:53 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x8000000000000000, 0x0) 07:04:53 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x3f00, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:53 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0x5460, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:53 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 1028.567569] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1028.589574] FAT-fs (loop0): Filesystem has been set read-only 07:04:53 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0285628, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:53 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x100000000000000, 0x0) [ 1028.628727] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:04:53 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)={0xfdfdffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 1028.719713] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:04:54 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x9, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) [ 1028.761758] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) 07:04:54 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x9300, 0x0) 07:04:54 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xb310000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:54 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 1028.870573] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:04:54 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0xa, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:54 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x706000, 0x0) [ 1028.915998] FAT-fs (loop5): Filesystem has been set read-only [ 1028.985178] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1029.081929] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1029.124003] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1029.129198] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) [ 1029.157403] FAT-fs (loop0): Filesystem has been set read-only 07:04:54 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x7a1c, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:54 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)={0x0, 0xfdfdffff00000000}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:54 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x7, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:54 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 1029.172949] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1029.195005] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1029.205402] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) 07:04:54 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x730000000000, 0x0) 07:04:54 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x5009, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:54 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0xc, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:54 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x2, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:54 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0xffefffffff7f0000, 0x0) 07:04:54 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0xd, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:54 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)={0x0, 0xfdfdffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:54 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 1029.463866] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1029.498588] FAT-fs (loop0): Filesystem has been set read-only [ 1029.569763] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1029.598500] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1029.651295] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) 07:04:54 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xf805, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:54 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x6, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:54 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x1000000, 0x0) 07:04:54 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xe51a000000000000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:55 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)={0x0, 0xfffffdfd}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:55 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x5, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:55 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x3f000000, 0x0) 07:04:55 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r0) 07:04:55 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x607000) 07:04:55 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x4, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) [ 1029.974962] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1029.990816] FAT-fs (loop5): Filesystem has been set read-only 07:04:55 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x2a030000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:55 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000040)=0xe8) setreuid(r0, r1) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r4 = dup(r3) ioctl$VHOST_SET_OWNER(r4, 0xaf01, 0x0) getsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000200)={{{@in=@multicast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000300)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f00000127c0)={'team0\x00', r5}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r4, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) close(r2) [ 1030.064243] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1030.119819] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:04:55 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xf408000000000000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:55 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0xb, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:55 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r0) 07:04:55 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7300) [ 1030.241283] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 07:04:55 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x8, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:55 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0xffffffffff600000) 07:04:55 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x28, r4, 0x4, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8001}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}]}, 0x28}}, 0x8000) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:55 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x100000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:55 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:55 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r0) 07:04:55 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x8000000000000000) [ 1030.562285] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1030.588020] FAT-fs (loop5): Filesystem has been set read-only 07:04:55 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) [ 1030.643911] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1030.672566] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1030.744452] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 07:04:56 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="0000ea2739cda39b714c24e562713c2d0d885c6726f4f60cde4f666657a6d6c34ac4580235be4ef935665803045e77b8444d7d000000000000ba548ae0f8991690c58ab2484d6c37cd6f02e925cbfa08aecc7cde9ca69c88b70a293082dcfa7b523ca6291d27b3f89dac02841e76ca57209068505222ac7806fdbd9961120c28aa23a8d6ae35c15b559bf2556539af6ce8e7aa439272d1e5fcf4d5dbd9cdd2e172aa1ed800d3242ff7eab7008418a9b803ef585f48fdff9c9f6315b7dc85d76a532a992b41d73b8ae0e893c8eed0c2b2e6c2a2cda843b23d8021625a62d2ebb4a3ec7930a37266bc1c441f92b04a0a5ebc07b25f886a6a204a4431081879bc06fe6a8c99a6879b171ad1c4c3bacd42d9712588f49861549b8519e1ff234a761c5a4844d63b93c68da6ce71dfc8f4acfaa23ed29b4456c553b2004df1e36a0ef2ecfb7291c1d9811f4039acb6a3786ff09ed092de1ff886c89de3ce949279fcd86fdf29ef39e5533a02d64f3ea9da6b6cd022c5f30db625a6d05e2b8a8184b1a178a58deff233e9d3b7b895b63c6a885ae19d4189f5"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xd9030000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:56 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r1 = dup(r0) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000000)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) 07:04:56 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:56 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x4065, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:56 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0xff600000) 07:04:56 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) close(r0) 07:04:56 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x70f000) 07:04:56 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:56 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000240)={{{@in=@empty, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000380)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000400)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000540)=0xe8) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000640)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in6=@local}}, &(0x7f0000000740)=0xe8) lstat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000840)={0x0, 0x0, 0x0}, &(0x7f0000000880)=0xc) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000008c0)={0x0, 0x0, 0x0}, &(0x7f0000000900)=0xc) fstat(r3, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000a00)={0x0, 0x0, 0x0}, &(0x7f0000000a40)=0xc) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000a80)={{}, {0x1, 0x1}, [{0x2, 0x2, r5}, {0x2, 0x4, r6}, {0x2, 0x2, r7}, {0x2, 0x3, r8}, {0x2, 0x5, r9}, {0x2, 0x0, r10}], {0x4, 0x7}, [{0x8, 0x4, r11}, {0x8, 0x5, r12}, {0x8, 0x0, r13}, {0x8, 0x5, r14}, {0x8, 0x7, r15}], {0x10, 0x3}, {0x20, 0x6}}, 0x7c, 0xd8eb3bf3acc164e5) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) close(r0) 07:04:56 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x100000000000000) 07:04:56 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:56 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xffffff7f00000000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:56 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xf0e, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:56 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) close(r0) 07:04:56 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590d50824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:56 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) ftruncate(r1, 0xbe2) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:56 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x9300) 07:04:56 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590850824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:56 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) close(r0) 07:04:56 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590950824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:56 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="0000ea2739cda39b714c24e562713c2d0d885c6726f4f60cde4f666657a6d6c34ac4580235be4ef935665803045e77b8444d7d000000000000ba548ae0f8991690c58ab2484d6c37cd6f02e925cbfa08aecc7cde9ca69c88b70a293082dcfa7b523ca6291d27b3f89dac02841e76ca57209068505222ac7806fdbd9961120c28aa23a8d6ae35c15b559bf2556539af6ce8e7aa439272d1e5fcf4d5dbd9cdd2e172aa1ed800d3242ff7eab7008418a9b803ef585f48fdff9c9f6315b7dc85d76a532a992b41d73b8ae0e893c8eed0c2b2e6c2a2cda843b23d8021625a62d2ebb4a3ec7930a37266bc1c441f92b04a0a5ebc07b25f886a6a204a4431081879bc06fe6a8c99a6879b171ad1c4c3bacd42d9712588f49861549b8519e1ff234a761c5a4844d63b93c68da6ce71dfc8f4acfaa23ed29b4456c553b2004df1e36a0ef2ecfb7291c1d9811f4039acb6a3786ff09ed092de1ff886c89de3ce949279fcd86fdf29ef39e5533a02d64f3ea9da6b6cd022c5f30db625a6d05e2b8a8184b1a178a58deff233e9d3b7b895b63c6a885ae19d4189f5"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x1e0c0000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:56 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x706000) 07:04:56 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590550824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:56 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="0000ea2739cda39b714c24e562713c2d0d885c6726f4f60cde4f666657a6d6c34ac4580235be4ef935665803045e77b8444d7d000000000000ba548ae0f8991690c58ab2484d6c37cd6f02e925cbfa08aecc7cde9ca69c88b70a293082dcfa7b523ca6291d27b3f89dac02841e76ca57209068505222ac7806fdbd9961120c28aa23a8d6ae35c15b559bf2556539af6ce8e7aa439272d1e5fcf4d5dbd9cdd2e172aa1ed800d3242ff7eab7008418a9b803ef585f48fdff9c9f6315b7dc85d76a532a992b41d73b8ae0e893c8eed0c2b2e6c2a2cda843b23d8021625a62d2ebb4a3ec7930a37266bc1c441f92b04a0a5ebc07b25f886a6a204a4431081879bc06fe6a8c99a6879b171ad1c4c3bacd42d9712588f49861549b8519e1ff234a761c5a4844d63b93c68da6ce71dfc8f4acfaa23ed29b4456c553b2004df1e36a0ef2ecfb7291c1d9811f4039acb6a3786ff09ed092de1ff886c89de3ce949279fcd86fdf29ef39e5533a02d64f3ea9da6b6cd022c5f30db625a6d05e2b8a8184b1a178a58deff233e9d3b7b895b63c6a885ae19d4189f5"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x5f07, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:57 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590250824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:57 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x60ff) 07:04:57 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x8) close(r0) 07:04:57 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(0xffffffffffffffff) [ 1031.832774] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:04:57 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590450824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) [ 1031.904067] FAT-fs (loop0): Filesystem has been set read-only [ 1031.980560] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1032.014250] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) 07:04:57 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="0000ea2739cda39b714c24e562713c2d0d885c6726f4f60cde4f666657a6d6c34ac4580235be4ef935665803045e77b8444d7d000000000000ba548ae0f8991690c58ab2484d6c37cd6f02e925cbfa08aecc7cde9ca69c88b70a293082dcfa7b523ca6291d27b3f89dac02841e76ca57209068505222ac7806fdbd9961120c28aa23a8d6ae35c15b559bf2556539af6ce8e7aa439272d1e5fcf4d5dbd9cdd2e172aa1ed800d3242ff7eab7008418a9b803ef585f48fdff9c9f6315b7dc85d76a532a992b41d73b8ae0e893c8eed0c2b2e6c2a2cda843b23d8021625a62d2ebb4a3ec7930a37266bc1c441f92b04a0a5ebc07b25f886a6a204a4431081879bc06fe6a8c99a6879b171ad1c4c3bacd42d9712588f49861549b8519e1ff234a761c5a4844d63b93c68da6ce71dfc8f4acfaa23ed29b4456c553b2004df1e36a0ef2ecfb7291c1d9811f4039acb6a3786ff09ed092de1ff886c89de3ce949279fcd86fdf29ef39e5533a02d64f3ea9da6b6cd022c5f30db625a6d05e2b8a8184b1a178a58deff233e9d3b7b895b63c6a885ae19d4189f5"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xb33d, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:57 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590b50824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:57 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x3f00) [ 1032.037877] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:04:57 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x600, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:57 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590650824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:57 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x1000000) 07:04:57 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r2) 07:04:57 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590a50824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:57 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x762f, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:57 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x4000) [ 1032.547940] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1032.556124] FAT-fs (loop5): Filesystem has been set read-only [ 1032.581936] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1032.604184] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1032.614224] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 07:04:58 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(0xffffffffffffffff) 07:04:58 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x7e09, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:58 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590750824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:58 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x507000) 07:04:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="0000ea2739cda39b714c24e562713c2d0d885c6726f4f60cde4f666657a6d6c34ac4580235be4ef935665803045e77b8444d7d000000000000ba548ae0f8991690c58ab2484d6c37cd6f02e925cbfa08aecc7cde9ca69c88b70a293082dcfa7b523ca6291d27b3f89dac02841e76ca57209068505222ac7806fdbd9961120c28aa23a8d6ae35c15b559bf2556539af6ce8e7aa439272d1e5fcf4d5dbd9cdd2e172aa1ed800d3242ff7eab7008418a9b803ef585f48fdff9c9f6315b7dc85d76a532a992b41d73b8ae0e893c8eed0c2b2e6c2a2cda843b23d8021625a62d2ebb4a3ec7930a37266bc1c441f92b04a0a5ebc07b25f886a6a204a4431081879bc06fe6a8c99a6879b171ad1c4c3bacd42d9712588f49861549b8519e1ff234a761c5a4844d63b93c68da6ce71dfc8f4acfaa23ed29b4456c553b2004df1e36a0ef2ecfb7291c1d9811f4039acb6a3786ff09ed092de1ff886c89de3ce949279fcd86fdf29ef39e5533a02d64f3ea9da6b6cd022c5f30db625a6d05e2b8a8184b1a178a58deff233e9d3b7b895b63c6a885ae19d4189f5"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x4452000000000000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:58 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590c50824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:58 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x70500000000000) [ 1032.951343] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1032.980288] FAT-fs (loop0): Filesystem has been set read-only [ 1033.028279] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:04:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x100000000000000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) [ 1033.103407] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1033.120988] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) 07:04:58 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0xf0700000000000) 07:04:58 executing program 3: uname(&(0x7f0000000080)=""/252) r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000180)={0x7, @vbi={0xe5, 0xff1, 0x2, 0x2036315a, [0x800, 0x8001], [0x4, 0x4], 0x108}}) 07:04:58 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x1000)=nil, 0x1000}, 0x1}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x2, 0x0) getsockopt$llc_int(r1, 0x10c, 0x6, &(0x7f00000000c0), &(0x7f0000000180)=0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x200, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) getsockopt$sock_timeval(r3, 0x1, 0x14, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000200)={0x2, 0x9}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r3, 0x4020565a, &(0x7f0000000280)={0x800100a, 0x7ff, 0x2}) ioctl$VHOST_SET_VRING_KICK(r3, 0x4008af20, &(0x7f0000000380)={0x2, r2}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', r3}, 0x10) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r3, 0xc008551a, &(0x7f0000000440)={0x1, 0xc, [0xffffffffffffff00, 0x8, 0x4ffd]}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x4001fd) getsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f00000001c0)=0x45f, &(0x7f0000000240)=0x2) write$P9_ROPEN(r3, &(0x7f0000000480)={0x18, 0x71, 0x1, {{0x80, 0x1, 0x5}, 0x9}}, 0x18) close(r0) 07:04:58 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="0000ea2739cda39b714c24e562713c2d0d885c6726f4f60cde4f666657a6d6c34ac4580235be4ef935665803045e77b8444d7d000000000000ba548ae0f8991690c58ab2484d6c37cd6f02e925cbfa08aecc7cde9ca69c88b70a293082dcfa7b523ca6291d27b3f89dac02841e76ca57209068505222ac7806fdbd9961120c28aa23a8d6ae35c15b559bf2556539af6ce8e7aa439272d1e5fcf4d5dbd9cdd2e172aa1ed800d3242ff7eab7008418a9b803ef585f48fdff9c9f6315b7dc85d76a532a992b41d73b8ae0e893c8eed0c2b2e6c2a2cda843b23d8021625a62d2ebb4a3ec7930a37266bc1c441f92b04a0a5ebc07b25f886a6a204a4431081879bc06fe6a8c99a6879b171ad1c4c3bacd42d9712588f49861549b8519e1ff234a761c5a4844d63b93c68da6ce71dfc8f4acfaa23ed29b4456c553b2004df1e36a0ef2ecfb7291c1d9811f4039acb6a3786ff09ed092de1ff886c89de3ce949279fcd86fdf29ef39e5533a02d64f3ea9da6b6cd022c5f30db625a6d05e2b8a8184b1a178a58deff233e9d3b7b895b63c6a885ae19d4189f5"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xde1, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) [ 1033.478901] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1033.488151] FAT-fs (loop0): Filesystem has been set read-only [ 1033.506305] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1033.516724] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1033.525903] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) 07:04:59 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf01, 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(0xffffffffffffffff) 07:04:59 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$tun(r0, &(0x7f00000000c0)={@void, @val={0x3, 0x7, 0x7fff, 0x6, 0x8, 0x2}, @ipx={0xffff, 0x2a, 0x1, 0x4, {@broadcast, @current, 0x81}, {@broadcast, @broadcast, 0x5}, "966e171aa70376d5bf08fdec"}}, 0x34) r1 = memfd_create(&(0x7f0000000000)='/dev/video#\x00', 0x4) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000180)={0x0, 0x9, 0x2, [0x7, 0x8]}, &(0x7f00000001c0)=0xc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x80000000}}, 0x0, 0x4, 0x2, 0x2, 0x9}, &(0x7f00000002c0)=0x98) syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000300)={0xd, @sliced={0x3, [0x800, 0x0, 0x9984, 0x6, 0x4, 0x5, 0x8, 0xfffffffffffffffb, 0x4, 0x1ff, 0x8, 0xf37d, 0xffffffffffffffc0, 0x1, 0x6, 0x6, 0x0, 0x4, 0x100000000, 0x1, 0x2ce, 0x6, 0xfffffffffffffffc, 0x101, 0x5, 0x9, 0x7ff, 0xc00000000000000, 0x6, 0x8894, 0xa2a6, 0x8, 0xfffffffffffff001, 0x200, 0x7, 0x4c53, 0x1, 0x5, 0x3, 0xdca, 0x8001, 0x6, 0x40, 0x1ff, 0x3, 0x6, 0x8, 0xdf], 0x4}}) 07:04:59 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x7fffffffefff) 07:04:59 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x53000000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:59 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x6d5, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:59 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000040)={0x6, 0x6}) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000180)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:59 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x3f00000000000000) 07:04:59 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="0000ea2739cda39b714c24e562713c2d0d885c6726f4f60cde4f666657a6d6c34ac4580235be4ef935665803045e77b8444d7d000000000000ba548ae0f8991690c58ab2484d6c37cd6f02e925cbfa08aecc7cde9ca69c88b70a293082dcfa7b523ca6291d27b3f89dac02841e76ca57209068505222ac7806fdbd9961120c28aa23a8d6ae35c15b559bf2556539af6ce8e7aa439272d1e5fcf4d5dbd9cdd2e172aa1ed800d3242ff7eab7008418a9b803ef585f48fdff9c9f6315b7dc85d76a532a992b41d73b8ae0e893c8eed0c2b2e6c2a2cda843b23d8021625a62d2ebb4a3ec7930a37266bc1c441f92b04a0a5ebc07b25f886a6a204a4431081879bc06fe6a8c99a6879b171ad1c4c3bacd42d9712588f49861549b8519e1ff234a761c5a4844d63b93c68da6ce71dfc8f4acfaa23ed29b4456c553b2004df1e36a0ef2ecfb7291c1d9811f4039acb6a3786ff09ed092de1ff886c89de3ce949279fcd86fdf29ef39e5533a02d64f3ea9da6b6cd022c5f30db625a6d05e2b8a8184b1a178a58deff233e9d3b7b895b63c6a885ae19d4189f5"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x7242, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:59 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x80003) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:04:59 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@ipv4={[], [], @local}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000400)=0xe8) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x4000, &(0x7f0000000440)={[{@uni_xlateno='uni_xlate=0'}, {@numtail='nonumtail=0'}, {@uni_xlate='uni_xlate=1'}, {@rodir='rodir'}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffa71}}, {@shortname_mixed='shortname=mixed'}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@uid_lt={'uid<', r0}}]}) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_DBG_G_CHIP_INFO(r1, 0xc0c85666, &(0x7f0000000180)={{0x4, @addr=0x9}, "8e826ece0080650d5a75c25194c7a596e4da7ce6c607b23c492dc4325de54a76", 0x1}) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:04:59 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x400000000000) [ 1034.168367] FAT-fs (loop3): Unrecognized mount option "fscontext=sysadm_u" or missing value 07:04:59 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) close(r3) 07:04:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xa2d, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:04:59 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x60ffffffffff) 07:04:59 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$inet(0x2, 0xffffffffffffffff, 0x0) r3 = dup3(r1, r2, 0x0) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000eefffc)=0x7fd, 0x4) setsockopt$sock_int(r3, 0x1, 0x1d, &(0x7f0000059000)=0x89a, 0x4) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000340)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000), 0x4) r4 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2) setxattr$trusted_overlay_upper(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='trusted.overlay.upper\x00', &(0x7f0000000280)={0x0, 0xfb, 0xba, 0x1, 0x2, "38bc8b0c0a4bae3a523d83fff620c46c", "16a898b7d7520a28cec2bc29e9f349a894237abcc2009a6aa95a2cb7c5e3f1b80049d2fc18ae1c633f8a8043901b4cf18dd721e4d8bba353f17c9863c60566b3bbdfd75fe28f5d4e441c517bf707d997c722dc08f3779215067dac68377f7d13b3477ad45f0422bc8406322d0c5496cd89dffaea69aa3678b973fa645186ad273e2bfc8650f42f734fd35a4f0f1a4eb3b0687be4d5b693a74fb71c7411d2f036b09e12a608"}, 0xba, 0x2) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r4, 0xc0385720, &(0x7f00000001c0)={0x0, {r5, r6+10000000}, 0x4, 0x8}) 07:04:59 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xe12d, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xde1, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:00 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0xfeffffff) 07:05:00 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000000)={0x100000000, 0x2, 0x2}) 07:05:00 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x4c0c0000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="0000ea2739cda39b714c24e562713c2d0d885c6726f4f60cde4f666657a6d6c34ac4580235be4ef935665803045e77b8444d7d000000000000ba548ae0f8991690c58ab2484d6c37cd6f02e925cbfa08aecc7cde9ca69c88b70a293082dcfa7b523ca6291d27b3f89dac02841e76ca57209068505222ac7806fdbd9961120c28aa23a8d6ae35c15b559bf2556539af6ce8e7aa439272d1e5fcf4d5dbd9cdd2e172aa1ed800d3242ff7eab7008418a9b803ef585f48fdff9c9f6315b7dc85d76a532a992b41d73b8ae0e893c8eed0c2b2e6c2a2cda843b23d8021625a62d2ebb4a3ec7930a37266bc1c441f92b04a0a5ebc07b25f886a6a204a4431081879bc06fe6a8c99a6879b171ad1c4c3bacd42d9712588f49861549b8519e1ff234a761c5a4844d63b93c68da6ce71dfc8f4acfaa23ed29b4456c553b2004df1e36a0ef2ecfb7291c1d9811f4039acb6a3786ff09ed092de1ff886c89de3ce949279fcd86fdf29ef39e5533a02d64f3ea9da6b6cd022c5f30db625a6d05e2b8a8184b1a178a58deff233e9d3b7b895b63c6a885ae19d4189f5"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xf438, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:00 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x705000) 07:05:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xde1, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:00 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, &(0x7f0000000000)=ANY=[@ANYBLOB="020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000480)='f2fs\x00', &(0x7f00000004c0)='./file0\x00', 0x8001, 0x2, &(0x7f00000006c0)=[{&(0x7f0000000500)="f85a0f98de40ea40b2fb5c4d1a9951a626a79af7591a98fc2e7c610837fc7054115f5916089ae4e774de44b8063f84a3437f361a5a8d9de0e8e9e6287e1efb5db7df7a75af3a1ab2df3195d20ac3e98b2f18a3ae03df3044044462d8d0d215db785dd1932a2c959d73187591088a9731ed693397ff0a298df1bf301bc9112fdb2055e523abcc0f17077a1388dad4e7cbb5d8b1454065d7e06b2964933e7177921830b431bb0a4ee9cef0e40671a11c1bb855ced153e527c54f11cd7f14b97798b7591f1512ca415108bcb94b746fdcee934f6bce83d1443970713969a5", 0xdd, 0x5}, {&(0x7f0000000600)="16dace3af2138d68bc92f56f79b8a6119c76deb3ca651633684bcab0ad2065f2258c711af515755276481233375d474c8ec0a95e0e787daeb8ccc8e03ab8375e84647dcfe6415f7bca38c6a438e366e13fc74476af8bcac69f981de97c87ad584e577264edc3e28914358146d6722a887baf853dc322118942977152443b32897e59590ecb2b19f140fdbc39f7906c59aefd2a7895f88fc83713de9c9c9774acac65129d250e9f77eeff87da11e48bb4b88a", 0xb2, 0xe435}], 0x800, &(0x7f00000007c0)=ANY=[@ANYBLOB="6e6f696e6c696e655f78617474722c7365636c6162656c2c6861731a927b8361636b6673666c6f6f723d73797a2c0036692a5758fe405a7da051a8383e46a029b9f8b11d32f40013c4e3932c158b4f6c43d3bdd748532d298b09b4069ee4a6bc7e601fcd99e5e04f8f561040ff4b6828ef2ae2f7b1611d233eb5a2a201d31a00000000000000000000000000000000"]) close(r0) r4 = add_key(&(0x7f00000000c0)='.dead\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000240)="286ea8b7cd3eaf0d3d9029c1262165fb8e04ad1f086f304f75762faf8b1c85f0d25766128958e3e23393af2a1c935e312f5630097c853f9774de1699d8180a953aeefb8fda932973a7e6ea0beb36f7e50a76d94f13bc13b8964fc5e94ec2233bf31e612ea407e6fb06efd56ad8f153b2b428775d8d2a20654a9c9e91cb91e67221", 0x81, 0xfffffffffffffffc) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r4, r5, r6) 07:05:00 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x100, 0x90000) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000280)=0xe8) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f00000002c0)={0xa67, 0x7fff, 0x6, 0x1, 0x5}) 07:05:00 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x3f000000) 07:05:00 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000000)={0x100000000, 0x2, 0x2}) 07:05:00 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="0000ea2739cda39b714c24e562713c2d0d885c6726f4f60cde4f666657a6d6c34ac4580235be4ef935665803045e77b8444d7d000000000000ba548ae0f8991690c58ab2484d6c37cd6f02e925cbfa08aecc7cde9ca69c88b70a293082dcfa7b523ca6291d27b3f89dac02841e76ca57209068505222ac7806fdbd9961120c28aa23a8d6ae35c15b559bf2556539af6ce8e7aa439272d1e5fcf4d5dbd9cdd2e172aa1ed800d3242ff7eab7008418a9b803ef585f48fdff9c9f6315b7dc85d76a532a992b41d73b8ae0e893c8eed0c2b2e6c2a2cda843b23d8021625a62d2ebb4a3ec7930a37266bc1c441f92b04a0a5ebc07b25f886a6a204a4431081879bc06fe6a8c99a6879b171ad1c4c3bacd42d9712588f49861549b8519e1ff234a761c5a4844d63b93c68da6ce71dfc8f4acfaa23ed29b4456c553b2004df1e36a0ef2ecfb7291c1d9811f4039acb6a3786ff09ed092de1ff886c89de3ce949279fcd86fdf29ef39e5533a02d64f3ea9da6b6cd022c5f30db625a6d05e2b8a8184b1a178a58deff233e9d3b7b895b63c6a885ae19d4189f5"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xec5e, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x1626, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:01 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x89, 0x208000) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:05:01 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x400000) 07:05:01 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000000)={0x100000000, 0x2, 0x2}) 07:05:01 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x3ab, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) [ 1035.809790] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1035.844653] FAT-fs (loop0): Filesystem has been set read-only 07:05:01 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xf3, 0x202) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:05:01 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x730000) [ 1035.917081] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1035.943719] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1035.958428] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) 07:05:01 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r3) 07:05:01 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000000)={0x100000000, 0x2, 0x2}) 07:05:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x4452, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:01 executing program 3: r0 = syz_open_dev$video(&(0x7f00000001c0)='/dev/video#\x00', 0x3, 0xfffffffffffffffc) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @pix={0xe68, 0x100000000, 0x313c715b, 0x2, 0x8, 0x401, 0x2, 0xffffffffffffff7f, 0x1, 0x3, 0x1, 0x1}}) 07:05:01 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000000)={0x100000000, 0x2, 0x2}) 07:05:01 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0xfeffffff00000000) 07:05:01 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="0000ea2739cda39b714c24e562713c2d0d885c6726f4f60cde4f666657a6d6c34ac4580235be4ef935665803045e77b8444d7d000000000000ba548ae0f8991690c58ab2484d6c37cd6f02e925cbfa08aecc7cde9ca69c88b70a293082dcfa7b523ca6291d27b3f89dac02841e76ca57209068505222ac7806fdbd9961120c28aa23a8d6ae35c15b559bf2556539af6ce8e7aa439272d1e5fcf4d5dbd9cdd2e172aa1ed800d3242ff7eab7008418a9b803ef585f48fdff9c9f6315b7dc85d76a532a992b41d73b8ae0e893c8eed0c2b2e6c2a2cda843b23d8021625a62d2ebb4a3ec7930a37266bc1c441f92b04a0a5ebc07b25f886a6a204a4431081879bc06fe6a8c99a6879b171ad1c4c3bacd42d9712588f49861549b8519e1ff234a761c5a4844d63b93c68da6ce71dfc8f4acfaa23ed29b4456c553b2004df1e36a0ef2ecfb7291c1d9811f4039acb6a3786ff09ed092de1ff886c89de3ce949279fcd86fdf29ef39e5533a02d64f3ea9da6b6cd022c5f30db625a6d05e2b8a8184b1a178a58deff233e9d3b7b895b63c6a885ae19d4189f5"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xe9070000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:01 executing program 4: ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0x402c5639, &(0x7f0000000000)={0x100000000, 0x2, 0x2}) 07:05:01 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x7) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) setsockopt$IP_VS_SO_SET_EDITDEST(r3, 0x0, 0x489, &(0x7f0000000240)={{0x2c, @loopback, 0x4e24, 0x3, 'dh\x00', 0x23, 0x5c9, 0x47}, {@rand_addr=0x1ff, 0x4e21, 0x3, 0xfffffffffffffffe, 0x0, 0x9}}, 0x44) setsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000080)=0x2, 0x2) ioctl$VIDIOC_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000180)={0x0, 0x7e5, [], @bt={0xdc3, 0x9554, 0xa4a, 0x4, 0x48c, 0x6, 0x0, 0x1}}) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f00000002c0)=0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0xfffffffffffffeaf, &(0x7f0000000380)={0x3}) 07:05:01 executing program 4: r0 = syz_open_dev$video(0x0, 0x3, 0x0) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000000)={0x100000000, 0x2, 0x2}) 07:05:01 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x930000) [ 1036.375966] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1036.431091] FAT-fs (loop0): Filesystem has been set read-only [ 1036.472000] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1036.509938] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:05:01 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000000)={0x100000000, 0x2, 0x2}) [ 1036.511204] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) 07:05:02 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f0000000000)) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f00000001c0)={{0x1, 0x3}, 'port1\x00', 0x4, 0x80000, 0x8, 0x101, 0x0, 0xfff, 0x2, 0x0, 0x2, 0x8}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f00000000c0)={0x34, 0x0, &(0x7f0000000040)}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:05:02 executing program 3: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xe6, 0x40a002) ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, &(0x7f0000000180)={0x3f6, "50c56619cbd8953d953c6f0d84d38050cd7b3a0e63705c1cd9d672411f57b92a", 0x3, 0x1}) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) ioctl$VIDIOC_S_SELECTION(r1, 0xc040565f, &(0x7f00000001c0)={0x4, 0x102, 0x4, {0x0, 0x7, 0x2, 0x3}}) 07:05:02 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0xfffffffe) 07:05:02 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x2d5a0000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:02 executing program 4: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0x402c5639, &(0x7f0000000000)={0x100000000, 0x2, 0x2}) 07:05:02 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x35340000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:02 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, 0x0) 07:05:02 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x730000000000) 07:05:02 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/autofs\x00', 0x2240, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0xfff, 0x1f, 0x81, 0x2, 0x26e, 0x2, 0x6, 0xf, 0x6168, 0xffff, 0x80000000, 0x10000, 0x9, 0x19594146, 0xffffffffffffff7f]}, &(0x7f0000000400)=0x100) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000440)={r1, 0x10001, 0x20, 0x7d, 0xffffffffffffff84}, &(0x7f00000004c0)=0x18) r3 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r3, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x10080, 0x0) name_to_handle_at(r4, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0xac, 0x70672777, "c3b66d9a2045815bd9686cc0b46e565ce80ff092b19b04059858b41b6500a2d2ca9df2c96bfeaa7725af7c9d541b00e52e743f5d88ab9f55ffbc7c7a3fb55447a7087114a17b67e61d673afde9a0bb4757031010311321d9f6798eda8f5fcb74354147638161efc772c4e4517d4e31bbee30e5487a3c0cad13da41e0aaa65cf6088409783f9b2d8a9f860a009e0d38cf4fdc5e4a7785471da75b156111a55352e8e49fa3"}, &(0x7f0000000280), 0x1400) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f0000000500)={r2, @in={{0x2, 0x4e20, @multicast2}}, [0x1, 0x7, 0x1, 0x7, 0x8000, 0x1f, 0x5, 0xff, 0x6028, 0x4, 0x0, 0x100, 0x1, 0x1000, 0x81]}, &(0x7f0000000480)=0x100) syz_open_dev$usb(&(0x7f0000000680)='/dev/bus/usb/00#/00#\x00', 0x80000000, 0x80000) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000600)={r5}, &(0x7f0000000640)=0x8) [ 1037.192312] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1037.223412] FAT-fs (loop5): Filesystem has been set read-only 07:05:02 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000000)={0x0, 0x2, 0x2}) [ 1037.286706] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1037.316499] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:05:02 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xf1e, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:02 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x17bb, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) [ 1037.342352] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 07:05:02 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$FUSE_GETXATTR(r2, &(0x7f0000000000)={0x18, 0xfffffffffffffffe, 0x3, {0x8}}, 0x18) close(r0) 07:05:02 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x930000000000) 07:05:02 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000200)='/dev/video#\x00', 0x3fc, 0x40000) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x15, &(0x7f00000001c0)=0x9, 0x4) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x43800410}, 0xc, &(0x7f0000000240)={&(0x7f00000003c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="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"], 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x41) arch_prctl$ARCH_SET_GS(0x1001, 0x35b680000000000) 07:05:02 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000000)={0x0, 0x0, 0x2}) 07:05:02 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x6000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) [ 1037.616694] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:05:02 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000000)={0x0, 0x2}) 07:05:02 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x5, 0xfffffffffffffffe) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x290001, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, &(0x7f00000001c0)=""/228, &(0x7f0000000040)=0xe4) 07:05:02 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0xf07000) [ 1037.668283] FAT-fs (loop5): Filesystem has been set read-only 07:05:03 executing program 4: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x400000) [ 1037.749044] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:05:03 executing program 3: ioctl$VIDIOC_G_FMT(0xffffffffffffffff, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) [ 1037.811452] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:05:03 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6c) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 1037.880492] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1037.910232] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 07:05:03 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x5ca, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:03 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0xffffffff00000000) 07:05:03 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000180)={0x5, @sliced={0x7, [0x2b0, 0x9f, 0x3, 0xfda8, 0x0, 0x3a, 0x85, 0x2, 0x0, 0x380000000000000, 0x8, 0xffffffffffff8000, 0x6, 0x9, 0x8, 0xff, 0xffffffffffffffe1, 0x8000, 0x0, 0x1, 0x9, 0x200000, 0x3, 0x4, 0x9, 0x1, 0xc8, 0xffffffffffffff29, 0x0, 0xfffffffffffffff9, 0x81, 0x7d, 0x8, 0x7, 0x1, 0x2, 0xf6c1, 0x1ff, 0x2, 0x3f, 0x1, 0x53, 0x9, 0xfd7d, 0x38ff, 0x7a0, 0x8, 0x3], 0x24}}) [ 1037.934324] FAT-fs (loop0): Filesystem has been set read-only [ 1037.965952] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:05:03 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x60700000000000) [ 1038.034865] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1038.081883] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) 07:05:03 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) r1 = dup(r0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x9, 0x30}, &(0x7f0000000180)=0xc) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000001c0)={r2, @in6={{0xa, 0x4e23, 0x2, @local, 0x6}}}, &(0x7f0000000280)=0x84) r3 = dup3(r0, r0, 0x80000) ioctl$VT_DISALLOCATE(r3, 0x5608) ioctl$RTC_PIE_ON(r3, 0x7005) ioctl$SG_GET_TIMEOUT(r3, 0x2202, 0x0) 07:05:03 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xffffff7f, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:03 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0xffefffffff7f0000) 07:05:03 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) userfaultfd(0x80000) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:05:03 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) read(r0, &(0x7f0000000180)=""/92, 0x5c) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:05:06 executing program 4: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x400000) 07:05:06 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xf825000000000000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:06 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) capget(&(0x7f0000000040)={0x20071026, r0}, &(0x7f0000000080)={0xc0000000000, 0x0, 0x7, 0x100000000, 0x2, 0x9}) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) sched_setaffinity(r0, 0x8, &(0x7f0000000000)=0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 07:05:06 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x762f, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:06 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0xd) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x8) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) close(r0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0x24}) 07:05:06 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0xffffffffffbfffff) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x90000, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0xdc001, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000180)={{0x0, 0xf000, 0xb, 0x10001, 0xf084, 0x0, 0x6, 0x9, 0x80, 0x3, 0x2, 0x10001}, {0x3000, 0x0, 0xa455adc4c55933a9, 0x8, 0x9, 0x5, 0x180000000000000, 0x8, 0x6, 0x2, 0x7, 0x7}, {0xd000, 0xf000, 0x9, 0x9, 0x9, 0x2e, 0x253f, 0x9, 0x6a, 0xfffffffffffffffb, 0xfffffffffffffffa, 0x2}, {0x3001, 0xf000, 0x0, 0x9950, 0x7ff, 0x179, 0x2324ca0c8000000, 0x7, 0xffffffffffffffe0, 0x7fffffff, 0xfffffffffffffff9, 0x4}, {0x4000, 0x10d000, 0x0, 0x0, 0x1, 0x8, 0x10000, 0x20, 0xcf59, 0xffffffffffffffc1, 0x89}, {0xf002, 0x113000, 0x14, 0x3f, 0x3, 0x2, 0x8001, 0x8, 0x3ff, 0x100000000, 0x100000001, 0x7}, {0x12000, 0x0, 0xd, 0xb90, 0x6, 0x3, 0x6, 0x9, 0x5, 0x7, 0x21, 0x1ff}, {0x4000, 0x100000, 0x0, 0x48b, 0xfff, 0x3, 0x4, 0x5, 0x1, 0x7, 0x2, 0x6}, {0x5000, 0x10000}, {0xf000}, 0x40010000, 0x0, 0x0, 0x400, 0x4, 0x800, 0x3000, [0x6, 0x9, 0x3, 0x10000]}) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) ioctl$SG_SET_RESERVED_SIZE(r1, 0x2275, &(0x7f0000000300)=0x3ff) [ 1040.862317] capability: warning: `syz-executor2' uses deprecated v2 capabilities in a way that may be insecure 07:05:06 executing program 3: times(&(0x7f0000000000)) r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000, 0x2, &(0x7f0000ffe000/0x2000)=nil) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) [ 1040.912190] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1040.921287] FAT-fs (loop5): Filesystem has been set read-only [ 1040.936349] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1040.947795] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1040.958363] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 07:05:06 executing program 2: clone(0x40100000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) syz_open_procfs$namespace(r0, &(0x7f0000000080)='ns/mnt\x00') ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x3, &(0x7f0000000080)) ptrace$setopts(0x4206, r0, 0x800, 0x8) ptrace$cont(0x80000000000020, r0, 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x10200, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f0000000040)=""/25) getpgrp(r0) [ 1041.030383] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1041.040411] FAT-fs (loop0): Filesystem has been set read-only 07:05:06 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x5f070000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:06 executing program 3: r0 = accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000380)) accept4$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000400)=0x14, 0x80000) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x400, 0x0) getsockname$unix(r2, &(0x7f00000002c0)=@abs, &(0x7f0000000340)=0x6e) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000180)={0xf, @pix={0x733, 0x4, 0x36314d59, 0xf, 0x3, 0x0, 0x9, 0xb61, 0x1, 0xc, 0x1, 0x5}}) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x3, 0x7, 0x401}) 07:05:06 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x5, 0x6, 0x7ff, 0x8000}, {0x5, 0x9, 0x800, 0x3f}, {0x5, 0x5, 0x8, 0x5}, {0x5, 0xfff, 0x81, 0x7}, {0x7f, 0x3, 0x7, 0xa695}, {0x6881, 0xfffffffffffffff9, 0x8, 0xfffffffffffff001}]}, 0x10) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r3 = dup(r2) ioctl$VHOST_SET_OWNER(r3, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r3, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) close(r1) fcntl$notify(r3, 0x402, 0x6) [ 1041.076350] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1041.139719] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1041.146132] IPVS: ftp: loaded support on port[0] = 21 [ 1041.148211] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) 07:05:06 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_S_HW_FREQ_SEEK(r0, 0x40305652, &(0x7f0000000240)={0x9, 0x7, 0x200, 0x80, 0x1, 0x65e, 0x8}) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f00000001c0)={{0x61a, 0x5}, {0x0, 0xb61}, 0x9, 0x1, 0x400}) [ 1041.315090] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1041.358096] FAT-fs (loop5): Filesystem has been set read-only [ 1041.401732] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1041.458462] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1041.500739] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 07:05:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x5f070000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:09 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x1662, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:09 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f00000001c0)={0x0, 0xfb, 0xa2, 0x5, 0x3, "90e27385e91d1687c9fdfc3879b89543", "489e63bc5020a6cad0d7f233a1dd454988435e48b15c3ad39b4067bce2e47609749bdd9ce781e4f7c305ee796f58e890eeb82c573e25bf7e29edf34f5698b7cf1f473d0efc3ae6a6fb7ea90761f9446812a04c8448de8c439cc748371047b17742ef21349466646ea4fc58ed5d7a6f776f0339da9df2079427c41e53a7d63168f1a3ff0102d576679547cd5f59"}, 0xa2, 0x1) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:05:09 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/31) tkill(r0, 0x10) ioctl$SG_GET_NUM_WAITING(r1, 0x227d, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 07:05:09 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$LOOP_GET_STATUS64(r2, 0x4c05, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:05:09 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x700, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) [ 1043.978086] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1043.992663] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:05:09 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x5, 0x403fff) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) [ 1044.020477] FAT-fs (loop5): Filesystem has been set read-only [ 1044.027673] FAT-fs (loop0): Filesystem has been set read-only [ 1044.041792] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1044.059754] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:05:09 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) r2 = accept(0xffffffffffffff9c, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000140)=0x80) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000180)={r2}) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x5, 0x0) [ 1044.091748] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1044.108213] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1044.126503] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) [ 1044.141172] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) 07:05:09 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xf408, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:09 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000880)='auxv\x00') sendto$unix(r0, &(0x7f00000008c0)="7a69adb9d8968ae361a65f0312d9dade9d3f8b00aa56298c8cc81f8a4d4eb5a605625b4ea5f645ab4852283590f38f8f009e5c1526f2fd61418dd530c5df7725296a7d6180e953ee23fe2b785681226e47aacae5bdb47ac65daa6fcd", 0x5c, 0x4, &(0x7f0000000940)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x48a003, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000200)=@nat={'nat\x00', 0x1b, 0x5, 0x608, 0x160, 0x160, 0x3a0, 0x290, 0x0, 0x538, 0x538, 0x538, 0x538, 0x538, 0x5, &(0x7f0000000180), {[{{@uncond, 0x0, 0x118, 0x160, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00', 0x0, {0xf, 0x4b0, 0x8, 0x1}}, @common=@ipv6header={0x28, 'ipv6header\x00', 0x0, {0x4c, 0x4a}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0xb, @ipv6=@loopback, @ipv4=@broadcast, @icmp_id=0x65, @port=0x4e22}}}, {{@ipv6={@loopback, @ipv4={[], [], @rand_addr=0x6f5}, [0xffffffff], [0xffffffff, 0x0, 0xffffffff, 0xffffffff], 'gretap0\x00', 'sit0\x00', {0xff}, {0xff}, 0x6, 0x81, 0x4}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@ipv6header={0x28, 'ipv6header\x00', 0x0, {0x39}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x4, 0x8, 0x7, 0x51, 0x7fffffff, 0x4, 0xd9, 0x1]}}}, {{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x13}, [0xffffffff, 0xffffffff, 0xffffffff, 0xffffff00], [0x0, 0xff000000, 0xff, 0xffffffff], 'bridge_slave_0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x67, 0xffff, 0x4, 0x40}, 0x0, 0xc8, 0x110}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x4, @ipv4=@multicast2, @ipv6=@mcast2, @icmp_id=0x64, @gre_key=0x5}}}, {{@uncond, 0x0, 0x158, 0x198, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0xbc, 0x8, 0x997, 0x9, 0x100000001, @local, @loopback, @mcast2, [0xffffff00, 0xffffff00, 0xffffff00, 0xff000000], [0xffffff00, 0xffffff00, 0xffffff00, 0xffffff00], [0xffffff00, 0xffffffff, 0xff000000, 0xff000000], 0x24, 0x1401}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x0, 0x5f, 0x7c9, 0x3, 0x3, 0x9, 0x1f, 0x5]}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x668) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f00000009c0)=0x2) 07:05:09 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x8000000000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3ff, 0x100) ioctl$DRM_IOCTL_AUTH_MAGIC(r1, 0x40046411, &(0x7f0000000040)=0x8) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r3 = dup(r2) ioctl$VHOST_SET_OWNER(r3, 0xaf01, 0x0) getpeername$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0x14) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@mcast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000580)=0xe8) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x17, r4, 0x1, 0xe1, 0x6, @random="b0587aa12f2f"}, 0x14) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000300)={'team0\x00', r5}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r3, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) close(r0) 07:05:09 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xd29, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x5f070000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:09 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x5, 0x100) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0xfa6, 0x0, 0x0, 0x401}) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40106437, &(0x7f0000000080)={r2, 0xea8c}) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x7fff) 07:05:09 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vsock\x00', 0x145002, 0x0) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000400)={0xfffffffffffff000, 0x0, @value}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x40000, 0x0) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000180)) ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f00000001c0)={0x3, 0x1, [0x1000, 0x4291, 0x5, 0xbb, 0x9, 0x3ff, 0x5, 0x6]}) r2 = add_key(&(0x7f0000000600)="6f676f6e0000028f559a8df974b4557b5297aa102f41b5e0582a8f88b5931d4094291597a92d749b170b45b82423eca5c1d230a273709d7ec709c6bb7d9aba3c9f406068726b5a21922912b9feb4deb3663665bf9c7924ff8be2181a4c4eb34e9007fde0f800e3c4886ca0d2d2d4d292016303c4bb2e8b20ce068cf63a4679d6cbfbb80a6c73f65be5e02f4ad7f384fc3911da8c2efce0eaddf6", &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="822246c1e671e4400fac144870ba05c1d877134b23f57ea8ae460e78855e8b8667daf247c684f9e8a2588ecb19bb442ef191178dcd24b28ad0342adac13a1639b6aab5add5a2e6ed52e1fc6a578f2988fb0243b2558b9ac7ca3b0cff724c30450807ae57eb460e0e858071", 0x6b, 0xfffffffffffffffa) keyctl$read(0xb, r2, &(0x7f0000000300)=""/161, 0xa1) r3 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r3, 0xc0d05604, &(0x7f0000000080)={0x0, @win={{0x10001, 0x2, 0xa9}, 0x6, 0x0, &(0x7f00000004c0)={{0x1, 0x0, 0x6, 0x3}, &(0x7f0000000480)={{0x8, 0xfffffffffffffff9, 0xffffffff, 0x5}, &(0x7f0000000440)={{0x401, 0x7, 0x8001, 0x887}}}}, 0xffffffffffffffce, &(0x7f0000000500)="574b733e8d50ded665a4077a8fade35bea3e0dee5a9007e2de43c7f4e95b284438aa9dbbb840d57859893388ef69f08c88917b17f7fe30e956ee02b5b8a03726a7495c911f757e4eb7381453769aa760468cdbd77dbcd9ea7a58347d7af41a74464d6bb80f1b3c3fc145e9c8403b733af6178844b36eeae6b9e82626ba066d10c1b9cd51846304ea480f8e09e08bd58bca7fc6cfecf01d52ab5a4321f93405779d9184401ea20f1b266be006a7c9f1d34432197f01ae163cb43089510a99b01a608123a5826822394440b7a8eec1c50101a6783210d0222eb35646f8c7233213a73e3fa81e2191878baad2f9cbc6e8e6d0", 0xc0}}) 07:05:09 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_keyring_id(0x0, r0, 0x3) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000240)=0xc) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r3, 0xc1105511, &(0x7f0000000380)={{0x0, 0x6, 0x4, 0x2}, 0x0, 0x20000000, 0x100000000, r4, 0x6, 0x5, 'syz1\x00', &(0x7f0000000280)=['}\x00', 'nodevem1em0[eth0%system/ppp1selinuxppp1\x00', 'user\x00', '&ppp1#\x00', 'team0\x00', '/dev/vhost-net\x00'], 0x4b, [], [0x1, 0x1ff, 0xa563, 0x400]}) r5 = dup(r2) ioctl$VHOST_SET_OWNER(r5, 0xaf01, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r5, 0x894b, &(0x7f0000000000)) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r5, 0x4008af25, &(0x7f0000000080)) ioctl$TIOCCONS(r5, 0x541d) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) close(r1) 07:05:09 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x0, @sliced={0x80000000, [0x2, 0x101, 0x0, 0x3, 0xbe52, 0xfffffffffffffffc, 0x40, 0x5, 0xea, 0x5, 0x5, 0x100000000, 0x1, 0x7, 0x8, 0x9, 0x80000000000, 0x81, 0x635, 0x1000, 0xa54, 0x8, 0x8, 0x81, 0xf1, 0x401, 0x7f, 0x6, 0x1, 0x10000, 0x0, 0x6, 0x3ff, 0x5, 0x2, 0x6, 0x0, 0x4, 0x5bcd, 0x40, 0x8, 0xffffffffffff8001, 0x0, 0x3, 0x400, 0xf354, 0x1, 0x1], 0xffffffff}}) 07:05:09 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x2606000000000000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:09 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="0000ea2739cda39b714c24e562713c2d0d885c6726f4f60cde4f666657a6d6c34ac4580235be4ef935665803045e77b8444d7d000000000000ba548ae0f8991690c58ab2484d6c37cd6f02e925cbfa08aecc7cde9ca69c88b70a293082dcfa7b523ca6291d27b3f89dac02841e76ca57209068505222ac7806fdbd9961120c28aa23a8d6ae35c15b559bf2556539af6ce8e7aa439272d1e5fcf4d5dbd9cdd2e172aa1ed800d3242ff7eab7008418a9b803ef585f48fdff9c9f6315b7dc85d76a532a992b41d73b8ae0e893c8eed0c2b2e6c2a2cda843b23d8021625a62d2ebb4a3ec7930a37266bc1c441f92b04a0a5ebc07b25f886a6a204a4431081879bc06fe6a8c99a6879b171ad1c4c3bacd42d9712588f49861549b8519e1ff234a761c5a4844d63b93c68da6ce71dfc8f4acfaa23ed29b4456c553b2004df1e36a0ef2ecfb7291c1d9811f4039acb6a3786ff09ed092de1ff886c89de3ce949279fcd86fdf29ef39e5533a02d64f3ea9da6b6cd022c5f30db625a6d05e2b8a8184b1a178a58deff233e9d3b7b895b63c6a885ae19d4189f5"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x1a4f, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x762f, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:10 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:05:10 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000008}, 0xc, &(0x7f00000002c0)={&(0x7f00000000c0)={0x20, r3, 0x20, 0x70bd25, 0x25dfdbff, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x7}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x40) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000380)={0x7fffffff, 0x0, 0x2, 0x7, 0x200}) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_DEL(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1400000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r4, 0x300, 0x70bd2c, 0x25dfdbfd, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x33}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004001}, 0xb1c166e662136301) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) close(r0) write(r5, &(0x7f00000001c0)="e6b707d9c5447adc83d43d534cd1fa2b9d99e0b26e097b3e77127879815d097d174b7649b069b84b55b64ffdd85d00efe84edfbf08b43c6db11d35aa486568cb7edc1339e1b20cbdc81a0a5ece64bc1795c3c228458f966d8a7afe7b2574e00d798074574d8abc5116992bd5fdeca827acf2a67407ae74ef1bfb606d319625720f8c7cfe0a6bc938c017447714d03e9551b7de4e1f2c1459ccd007dcb5588bf4b10435a589a78bdbaf7d986392113a32b1e98b026936f35485430977b050d8f48975987b0286", 0xc6) [ 1044.893560] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1044.953771] FAT-fs (loop0): Filesystem has been set read-only [ 1044.998901] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1045.018596] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1045.035699] FAT-fs (loop5): Filesystem has been set read-only 07:05:10 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x2000, 0x0) getsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000180)=""/73, &(0x7f0000000200)=0x49) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) [ 1045.068423] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1045.097313] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:05:10 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="0000ea2739cda39b714c24e562713c2d0d885c6726f4f60cde4f666657a6d6c34ac4580235be4ef935665803045e77b8444d7d000000000000ba548ae0f8991690c58ab2484d6c37cd6f02e925cbfa08aecc7cde9ca69c88b70a293082dcfa7b523ca6291d27b3f89dac02841e76ca57209068505222ac7806fdbd9961120c28aa23a8d6ae35c15b559bf2556539af6ce8e7aa439272d1e5fcf4d5dbd9cdd2e172aa1ed800d3242ff7eab7008418a9b803ef585f48fdff9c9f6315b7dc85d76a532a992b41d73b8ae0e893c8eed0c2b2e6c2a2cda843b23d8021625a62d2ebb4a3ec7930a37266bc1c441f92b04a0a5ebc07b25f886a6a204a4431081879bc06fe6a8c99a6879b171ad1c4c3bacd42d9712588f49861549b8519e1ff234a761c5a4844d63b93c68da6ce71dfc8f4acfaa23ed29b4456c553b2004df1e36a0ef2ecfb7291c1d9811f4039acb6a3786ff09ed092de1ff886c89de3ce949279fcd86fdf29ef39e5533a02d64f3ea9da6b6cd022c5f30db625a6d05e2b8a8184b1a178a58deff233e9d3b7b895b63c6a885ae19d4189f5"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xf0e, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) [ 1045.112899] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) [ 1045.152344] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1045.176422] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 07:05:10 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="0000ea2739cda39b714c24e562713c2d0d885c6726f4f60cde4f666657a6d6c34ac4580235be4ef935665803045e77b8444d7d000000000000ba548ae0f8991690c58ab2484d6c37cd6f02e925cbfa08aecc7cde9ca69c88b70a293082dcfa7b523ca6291d27b3f89dac02841e76ca57209068505222ac7806fdbd9961120c28aa23a8d6ae35c15b559bf2556539af6ce8e7aa439272d1e5fcf4d5dbd9cdd2e172aa1ed800d3242ff7eab7008418a9b803ef585f48fdff9c9f6315b7dc85d76a532a992b41d73b8ae0e893c8eed0c2b2e6c2a2cda843b23d8021625a62d2ebb4a3ec7930a37266bc1c441f92b04a0a5ebc07b25f886a6a204a4431081879bc06fe6a8c99a6879b171ad1c4c3bacd42d9712588f49861549b8519e1ff234a761c5a4844d63b93c68da6ce71dfc8f4acfaa23ed29b4456c553b2004df1e36a0ef2ecfb7291c1d9811f4039acb6a3786ff09ed092de1ff886c89de3ce949279fcd86fdf29ef39e5533a02d64f3ea9da6b6cd022c5f30db625a6d05e2b8a8184b1a178a58deff233e9d3b7b895b63c6a885ae19d4189f5"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xf0, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) [ 1046.272436] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) [ 1046.279692] FAT-fs (loop5): Filesystem has been set read-only 07:05:12 executing program 3: r0 = syz_open_dev$video(&(0x7f00000001c0)='/dev/video#\x00', 0x3, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3, 0x2800) setsockopt$inet_tcp_int(r1, 0x6, 0x1f, &(0x7f0000000180)=0x2ffff, 0x4) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:05:12 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$KDGKBLED(r2, 0x4b64, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:05:12 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xff0f0000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:12 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xc6e4, 0x60800) write$sndseq(r1, &(0x7f0000000040)=[{0x3ff, 0x5, 0x80, 0x100000001, @time={0x77359400}, {0x3, 0x7fff}, {0x3, 0x100000000}, @queue={0x2, {0x5, 0x100}}}], 0x30) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 07:05:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xf0e, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:12 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x5898, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:12 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x80000, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000001c0)=0x1, 0x4) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000000)={0x3, "bdd944c50e98a7bfa0fab61552779d008313a8ca56b19e333bb3508010c0de98", 0x1, 0x1}) 07:05:12 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="0000ea2739cda39b714c24e562713c2d0d885c6726f4f60cde4f666657a6d6c34ac4580235be4ef935665803045e77b8444d7d000000000000ba548ae0f8991690c58ab2484d6c37cd6f02e925cbfa08aecc7cde9ca69c88b70a293082dcfa7b523ca6291d27b3f89dac02841e76ca57209068505222ac7806fdbd9961120c28aa23a8d6ae35c15b559bf2556539af6ce8e7aa439272d1e5fcf4d5dbd9cdd2e172aa1ed800d3242ff7eab7008418a9b803ef585f48fdff9c9f6315b7dc85d76a532a992b41d73b8ae0e893c8eed0c2b2e6c2a2cda843b23d8021625a62d2ebb4a3ec7930a37266bc1c441f92b04a0a5ebc07b25f886a6a204a4431081879bc06fe6a8c99a6879b171ad1c4c3bacd42d9712588f49861549b8519e1ff234a761c5a4844d63b93c68da6ce71dfc8f4acfaa23ed29b4456c553b2004df1e36a0ef2ecfb7291c1d9811f4039acb6a3786ff09ed092de1ff886c89de3ce949279fcd86fdf29ef39e5533a02d64f3ea9da6b6cd022c5f30db625a6d05e2b8a8184b1a178a58deff233e9d3b7b895b63c6a885ae19d4189f5"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x357000000000000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:12 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x7fffa) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x10000, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) r4 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x5, 0x248040) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r4, &(0x7f00000001c0)="be532d86b950d81e0e7cc6ea3a92747a33e1e806db0d15a173d6e8a438a1017d539ab02b5f3f1444c8dc5c865e75c9d596685c1cc0db0ebc9091239d0cc1ea2758be07595ef71b69f1689b4566ad90e9e8e27c8de464c5998894ccd74d453dfe9037aa816c24f539d884061b91e5767b817b236b7451fd61437c8724bbf9f7b15dc372ba0812d6cb362acd7599d0ce93adef925e0988c0149754346f0c95f972bfedb7fde554dd382cbb94c34f5023d099be0edc45a8af8b0df9c8e8838fc3df462e", &(0x7f0000000040)=""/48}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:05:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xf0e, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:12 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x100000) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 07:05:13 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x38f4, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:13 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x10000) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0xfff, 0x7, 0x1, "dcb8671dc4126742bfc0a6c6862d851c7930e047658bc681fe5cab598907a81a", 0x35377f5f}) syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) 07:05:13 executing program 2: clone(0x3106001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000040)={'U+', 0x6}, 0x28, 0x0) tkill(r0, 0xf) ptrace$cont(0x18, r0, 0x0, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x398b5844aa0aaab8, 0x0) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000200)={0x57, 0xb9, 0x1, {0x8, 0x7}, {0x200, 0x7}, @rumble={0x9, 0x4c}}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0bc5351, &(0x7f0000000240)={0x0, 0x1, 'client0\x00', 0x2, "9a9c636fa54be0a6", "dff267c18a417d0abcf2d511dfd4b6ccaa84b2c12d251a820fa380bf0a50139e", 0x100, 0xed}) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x800, 0x0) getsockopt$XDP_STATISTICS(r3, 0x11b, 0x7, &(0x7f0000000140), &(0x7f0000000180)=0x18) 07:05:13 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fsetxattr$security_ima(r2, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@v2={0x3, 0x3, 0x5, 0x23c3, 0x15, "e733343b0039c4306b98381801d3be49781f8a0fb2"}, 0x1f, 0x1) close(r0) 07:05:13 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x80000000000003, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:05:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x946b000000000000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:13 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x20041, 0x0) ioctl$KVM_SET_SREGS(r0, 0x4138ae84, &(0x7f0000000180)={{0x0, 0x106000, 0xb, 0xbffc, 0x80000000, 0xfffffffffffffffa, 0x8, 0xfffffffffffff277, 0x7, 0x247e, 0x40, 0xffffffffffff8000}, {0x0, 0x6000, 0xe, 0x0, 0xfff, 0x4, 0x7, 0x5, 0x0, 0x6, 0xd0e5, 0x1}, {0x2, 0x110000, 0xc, 0x9, 0x4c, 0x3, 0x5, 0x7fff, 0x8, 0xfff, 0x1ff, 0x6cb}, {0x0, 0x6004, 0x0, 0x7, 0x10000, 0x200, 0x1, 0x1, 0xc1, 0x7, 0x0, 0x4}, {0x1, 0x1, 0x0, 0x1, 0x217, 0xff, 0x2, 0x235, 0x9, 0xafc, 0x5, 0x5}, {0x3002, 0xf000, 0x0, 0x0, 0x43, 0x8, 0x10000, 0x1, 0x80000001, 0x0, 0x7, 0x6}, {0x7000, 0x100000, 0x0, 0x552d, 0x2, 0x50, 0x401, 0x0, 0x7f, 0x101, 0x7ff, 0xffffffff}, {0x0, 0x5000, 0xe571a31934408a8e, 0x7, 0x8, 0x1, 0x6, 0x8001, 0x80000000, 0x62, 0x0, 0x1}, {0x100000, 0x1000}, {0x1002, 0x106006}, 0x2, 0x0, 0x1, 0x516, 0x1, 0x900, 0x0, [0x1, 0x7ff, 0x100000001]}) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:05:13 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xbb070000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:13 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x5d57, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:13 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x2, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='pagemap\x00') getpeername$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f0000000080)=0x14) openat$uhid(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uhid\x00', 0x802, 0x0) r3 = geteuid() setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@remote, @in6=@local, 0x4e24, 0x8, 0x4e22, 0x9, 0xa, 0xa0, 0x80, 0x16, r2, r3}, {0x2, 0x0, 0x8, 0xbcc8, 0x1, 0x1ff, 0x100000000, 0x6}, {0x9, 0xffffffffffff8000, 0xff, 0x799}, 0x9, 0x0, 0x1, 0x0, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x16}, 0x4d3, 0x2b}, 0x0, @in6, 0x3504, 0x3, 0x2, 0x5, 0x7, 0x80000000, 0x6}}, 0xe8) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x80, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 07:05:13 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r2, 0xc0305302, &(0x7f0000000000)={0x4, 0x0, 0xfffffffffffffffe, 0x3, 0x6, 0x3ff}) 07:05:13 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x82000, 0x0) setsockopt$inet6_buf(r1, 0x29, 0xff, &(0x7f0000000200)="58f78bb6b0ce7c3c83658104179d450c377c13c780bc9bd8f2ba7b6145b884eaac32f85185dcd76353473a35c330804c612bf560188c4e169ce11248ff031cc1e336837f029ace23cb8ca33e9aea9f47541f60a89eba172ac98cdf7ee1255add72bd584e0bab7a713c43fe3202c861b9c37cd4329ca7d732f1", 0x79) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x4, 0x509240) mq_timedreceive(r2, &(0x7f0000000140)=""/161, 0xa1, 0x1, 0x0) tkill(r0, 0x10) ptrace$cont(0x1f, r0, 0xfffffffffffffffc, 0x769) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$cont(0x20, r0, 0x0, 0x0) 07:05:13 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000380)={0x0, @sdr={0x3836355b, 0xf67}}) 07:05:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="0000ea2739cda39b714c24e562713c2d0d885c6726f4f60cde4f666657a6d6c34ac4580235be4ef935665803045e77b8444d7d000000000000ba548ae0f8991690c58ab2484d6c37cd6f02e925cbfa08aecc7cde9ca69c88b70a293082dcfa7b523ca6291d27b3f89dac02841e76ca57209068505222ac7806fdbd9961120c28aa23a8d6ae35c15b559bf2556539af6ce8e7aa439272d1e5fcf4d5dbd9cdd2e172aa1ed800d3242ff7eab7008418a9b803ef585f48fdff9c9f6315b7dc85d76a532a992b41d73b8ae0e893c8eed0c2b2e6c2a2cda843b23d8021625a62d2ebb4a3ec7930a37266bc1c441f92b04a0a5ebc07b25f886a6a204a4431081879bc06fe6a8c99a6879b171ad1c4c3bacd42d9712588f49861549b8519e1ff234a761c5a4844d63b93c68da6ce71dfc8f4acfaa23ed29b4456c553b2004df1e36a0ef2ecfb7291c1d9811f4039acb6a3786ff09ed092de1ff886c89de3ce949279fcd86fdf29ef39e5533a02d64f3ea9da6b6cd022c5f30db625a6d05e2b8a8184b1a178a58deff233e9d3b7b895b63c6a885ae19d4189f5"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xc25b0000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:13 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$VIDIOC_G_STD(0xffffffffffffffff, 0x80085617, &(0x7f0000000240)=0x0) ioctl$VIDIOC_S_STD(r0, 0x40085618, &(0x7f0000000280)=r1) r2 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r2, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000200)={0xf, 0x8, 0xfa00, {r4, 0x6}}, 0x10) 07:05:13 executing program 2: clone(0x80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(r0, 0x0, 0x7ffffffd, 0x0) timer_create(0x7, &(0x7f0000000080)={0x0, 0x39, 0x6, @tid=r0}, &(0x7f0000000140)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000040)=r0) renameat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00') ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 07:05:13 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="0000ea2739cda39b714c24e562713c2d0d885c6726f4f60cde4f666657a6d6c34ac4580235be4ef935665803045e77b8444d7d000000000000ba548ae0f8991690c58ab2484d6c37cd6f02e925cbfa08aecc7cde9ca69c88b70a293082dcfa7b523ca6291d27b3f89dac02841e76ca57209068505222ac7806fdbd9961120c28aa23a8d6ae35c15b559bf2556539af6ce8e7aa439272d1e5fcf4d5dbd9cdd2e172aa1ed800d3242ff7eab7008418a9b803ef585f48fdff9c9f6315b7dc85d76a532a992b41d73b8ae0e893c8eed0c2b2e6c2a2cda843b23d8021625a62d2ebb4a3ec7930a37266bc1c441f92b04a0a5ebc07b25f886a6a204a4431081879bc06fe6a8c99a6879b171ad1c4c3bacd42d9712588f49861549b8519e1ff234a761c5a4844d63b93c68da6ce71dfc8f4acfaa23ed29b4456c553b2004df1e36a0ef2ecfb7291c1d9811f4039acb6a3786ff09ed092de1ff886c89de3ce949279fcd86fdf29ef39e5533a02d64f3ea9da6b6cd022c5f30db625a6d05e2b8a8184b1a178a58deff233e9d3b7b895b63c6a885ae19d4189f5"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x6a08000000000000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) [ 1048.555716] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1048.570172] FAT-fs (loop0): Filesystem has been set read-only [ 1048.601594] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:05:13 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_EDID(r0, 0xc0285628, &(0x7f0000000180)={0x80000000, 0xb4, 0x7, [], &(0x7f0000000000)=0x6}) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:05:13 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000000)={0x80}, 0x8) mmap(&(0x7f0000013000/0x2000)=nil, 0x2000, 0x1, 0x32, r0, 0xfffffffffffffffd) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000340)) sendfile(r0, r0, &(0x7f00000000c0), 0x2) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhost-net\x00', 0x2, 0x0) r3 = dup(r2) socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$VHOST_SET_OWNER(r3, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r3, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) close(r1) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r3, 0x8008ae9d, &(0x7f0000000040)=""/7) [ 1048.647540] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1048.667632] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) 07:05:13 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x730068, 0xffffffff7ff0bdbe}) 07:05:14 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7, 0x40000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)={0x1, 0x0, [0x0]}) ptrace$cont(0x20, r0, 0x0, 0x0) 07:05:14 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="0000ea2739cda39b714c24e562713c2d0d885c6726f4f60cde4f666657a6d6c34ac4580235be4ef935665803045e77b8444d7d000000000000ba548ae0f8991690c58ab2484d6c37cd6f02e925cbfa08aecc7cde9ca69c88b70a293082dcfa7b523ca6291d27b3f89dac02841e76ca57209068505222ac7806fdbd9961120c28aa23a8d6ae35c15b559bf2556539af6ce8e7aa439272d1e5fcf4d5dbd9cdd2e172aa1ed800d3242ff7eab7008418a9b803ef585f48fdff9c9f6315b7dc85d76a532a992b41d73b8ae0e893c8eed0c2b2e6c2a2cda843b23d8021625a62d2ebb4a3ec7930a37266bc1c441f92b04a0a5ebc07b25f886a6a204a4431081879bc06fe6a8c99a6879b171ad1c4c3bacd42d9712588f49861549b8519e1ff234a761c5a4844d63b93c68da6ce71dfc8f4acfaa23ed29b4456c553b2004df1e36a0ef2ecfb7291c1d9811f4039acb6a3786ff09ed092de1ff886c89de3ce949279fcd86fdf29ef39e5533a02d64f3ea9da6b6cd022c5f30db625a6d05e2b8a8184b1a178a58deff233e9d3b7b895b63c6a885ae19d4189f5"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x8000000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:14 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000200)={0xb, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) r1 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000180)={0x1, 0x8001, 0x400000000000008}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/autofs\x00', 0x694241, 0x0) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000140), 0x4) setxattr$security_smack_entry(&(0x7f0000002ac0)='./file0\x00', &(0x7f0000002b00)='security.SMACK64EXEC\x00', &(0x7f0000002b40)='\x00', 0x1, 0x0) r3 = shmget$private(0x0, 0x2000, 0x12, &(0x7f0000ffb000/0x2000)=nil) shmctl$SHM_INFO(r3, 0xe, &(0x7f0000000300)=""/92) getsockopt$EBT_SO_GET_INIT_ENTRIES(r2, 0x0, 0x83, &(0x7f0000002900)={'nat\x00', 0x0, 0x3, 0x1000, [], 0xa, &(0x7f0000001840)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000001900)=""/4096}, &(0x7f0000002980)=0x78) shmctl$IPC_INFO(r3, 0x3, &(0x7f0000000080)=""/158) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000029c0)) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000002bc0)={0x5, &(0x7f0000002b80)=[{}, {}, {}, {}, {0x0}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4010641c, &(0x7f0000002c40)={r4, &(0x7f0000002c00)=""/54}) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000000)=0xa2) vmsplice(r1, &(0x7f00000017c0)=[{&(0x7f00000003c0)="72c95f9e1ccc24204a0863a3e379dad3", 0x10}, {&(0x7f0000000400)="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", 0xff}, {&(0x7f0000000500)="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", 0x1000}, {&(0x7f0000001500)="71ff1bec9f922fdd6c4e49fa19f710ea6fbc01044a625dc7e77465cbf774e42f49240e2111494e3a4b768b655b60a1cda12d370b820c9da42cba64842ced80d1c0e6f498103b35d30152589fafb59786d3d530f2b02a7a6abadd33df3f2bf6f187908a15dce9fbad0cbd29bef22e91b4418e41949a15bfc2ab2ee0825a36d7cff6082a458564a85a3ff147", 0x8b}, {&(0x7f00000015c0)="51a4528d00f48287d16881a51a560a070681cd559be9c71221a65af8f69c6e838dd005fa572b9d7909d7198857a990152b1728bd9f48f1fcf4e80bb993fec4b4414834da5af85aa8cce052988bbc09502a9f80ed9e9b5ab580778bb434e7194373b726e47555dd68eb8bd12cd2ef8294a70ba90468bc6bf65fb5931b14cc94b78d08ffc11a471c4469fdbb4346a9415e566b70c1e937b8f008b63a8a5540c6f6e53b4fab04b8d8c5d1f1962870a9bba526c8ed24d8a8", 0xb6}, {&(0x7f0000001680)="d15afb96e84bbf54", 0x8}, {&(0x7f00000016c0)="152670ba86664b87ccbf693520d60d652f600f776c2a893083ab4b90aa36be9a41181c74e2ee7ba1c8518637cb0ffcff0e7dd35257dac1122618c28484e763eb6a04b3c6b6bcdc8c56b773df193bf96a0d2d75a749b06da191e92ef204457aaa5a1af0c1cbcad24c08104dbfc0c9dd5b2eb69e8b661cbd427360e63abc853f065049d0d888154d608bef891dbb692bae2c4bcb0ea0979095272f524c205790fa2879d36eefc5da21a410753f7e561400f55f73811c5c06f33e3d4240903e9c35d837562a4ad948175c6297767a71b6aa89f26ce5", 0xd4}], 0x7, 0x8) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000002a00)={0x0, 0x0, 0x8001}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000002a40)={0x0, 0x0, 0x100000000}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000002a80)={r5, r6}) [ 1048.838920] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 07:05:14 executing program 4: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, 0x0) exit(0x0) sendfile(r0, r1, 0x0, 0x5) 07:05:14 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000000)='security^^vboxnet1]\x00', 0x7) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000040)={0x0, 0x4, 0xfffffffffffffffe, 0x5, 0x0}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000140)={r2}, 0x8) 07:05:14 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x10240, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000280)=0x8001, 0x4) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x200, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r2, 0xc08c5334, &(0x7f0000000180)={0x3, 0x8, 0x80000001, 'queue0\x00', 0x5bf}) 07:05:14 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_create(0x3, &(0x7f0000000040)={0x0, 0x19, 0x0, @thr={&(0x7f0000000000)="af81ebdc70e1adb9b7195f84f78cfa70140fc71e3eada0c866c1", &(0x7f00000001c0)="9d9a7bd02fd3d9a1bc7349b3764415ebd33e0494e0f1d47ab621323cd8cac62920ca59d1dfe2475247966897cc892baa51be09dfc8eada9e3bff5a03ff38f52ecf391fe4814da0"}}, &(0x7f00000000c0)=0x0) timer_gettime(r4, &(0x7f0000000240)) close(r0) 07:05:14 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="0000ea2739cda39b714c24e562713c2d0d885c6726f4f60cde4f666657a6d6c34ac4580235be4ef935665803045e77b8444d7d000000000000ba548ae0f8991690c58ab2484d6c37cd6f02e925cbfa08aecc7cde9ca69c88b70a293082dcfa7b523ca6291d27b3f89dac02841e76ca57209068505222ac7806fdbd9961120c28aa23a8d6ae35c15b559bf2556539af6ce8e7aa439272d1e5fcf4d5dbd9cdd2e172aa1ed800d3242ff7eab7008418a9b803ef585f48fdff9c9f6315b7dc85d76a532a992b41d73b8ae0e893c8eed0c2b2e6c2a2cda843b23d8021625a62d2ebb4a3ec7930a37266bc1c441f92b04a0a5ebc07b25f886a6a204a4431081879bc06fe6a8c99a6879b171ad1c4c3bacd42d9712588f49861549b8519e1ff234a761c5a4844d63b93c68da6ce71dfc8f4acfaa23ed29b4456c553b2004df1e36a0ef2ecfb7291c1d9811f4039acb6a3786ff09ed092de1ff886c89de3ce949279fcd86fdf29ef39e5533a02d64f3ea9da6b6cd022c5f30db625a6d05e2b8a8184b1a178a58deff233e9d3b7b895b63c6a885ae19d4189f5"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x70000000000000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:14 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000000, 0x9036173454b92cb4, r0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f0000000280)) ioctl$KVM_SMI(r1, 0xaeb7) r2 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x40000003, 0x0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000040)={0x1, 0x418}) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000100)=0x2000005, 0x1) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000080)={0x0, {0x400, 0xab2, 0x9, 0x3}, {0x60de, 0x10000, 0x1000, 0x1f}, {0x400, 0x5}}) ioctl$VIDIOC_G_FMT(r2, 0xc0d05604, &(0x7f00000005c0)={0x100f, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:05:14 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) r1 = socket$pptp(0x18, 0x1, 0x2) fcntl$lock(r1, 0x27, &(0x7f0000000000)={0x3, 0x3, 0xa998, 0x3ff, r0}) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) fcntl$setown(r1, 0x8, r0) 07:05:14 executing program 4: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, 0x0) exit(0x0) sendfile(r0, r1, 0x0, 0x5) 07:05:14 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xab03, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:14 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80000, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000240)={{{@in6, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000380)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000640)={@mcast2, 0x0}, &(0x7f0000000680)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000007c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000800)={@local, @broadcast, 0x0}, &(0x7f0000000840)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000000a80)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="9c010000", @ANYRES16=r2, @ANYBLOB="02002dbd7000fbdbdf250200000008000100", @ANYRES32=r3, @ANYBLOB="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", @ANYRES32=r4, @ANYBLOB="780002003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000000000008000100", @ANYRES32=r6, @ANYBLOB="7c00020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000700000008000600", @ANYRES32=r7, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e74000000000000000000000000000008000300030000000800040005000000"], 0x19c}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r9 = dup(r8) ioctl$VHOST_SET_OWNER(r9, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r9, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r9, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) close(r0) 07:05:14 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="0000ea2739cda39b714c24e562713c2d0d885c6726f4f60cde4f666657a6d6c34ac4580235be4ef935665803045e77b8444d7d000000000000ba548ae0f8991690c58ab2484d6c37cd6f02e925cbfa08aecc7cde9ca69c88b70a293082dcfa7b523ca6291d27b3f89dac02841e76ca57209068505222ac7806fdbd9961120c28aa23a8d6ae35c15b559bf2556539af6ce8e7aa439272d1e5fcf4d5dbd9cdd2e172aa1ed800d3242ff7eab7008418a9b803ef585f48fdff9c9f6315b7dc85d76a532a992b41d73b8ae0e893c8eed0c2b2e6c2a2cda843b23d8021625a62d2ebb4a3ec7930a37266bc1c441f92b04a0a5ebc07b25f886a6a204a4431081879bc06fe6a8c99a6879b171ad1c4c3bacd42d9712588f49861549b8519e1ff234a761c5a4844d63b93c68da6ce71dfc8f4acfaa23ed29b4456c553b2004df1e36a0ef2ecfb7291c1d9811f4039acb6a3786ff09ed092de1ff886c89de3ce949279fcd86fdf29ef39e5533a02d64f3ea9da6b6cd022c5f30db625a6d05e2b8a8184b1a178a58deff233e9d3b7b895b63c6a885ae19d4189f5"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x91140000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:14 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000180)={0x1, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:05:14 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xffffffffffffffff, 0x101081) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000080)={0x5, &(0x7f0000000040)=[{}, {}, {0x0}, {}, {}]}) ioctl$DRM_IOCTL_DMA(r1, 0xc0406429, &(0x7f0000000240)={r2, 0x4, &(0x7f0000000140)=[0x0, 0x0, 0x7, 0x6], &(0x7f0000000180)=[0x80000001, 0x6, 0x100, 0x8, 0x4632aadc], 0x33, 0x2, 0x4, &(0x7f00000001c0)=[0x7fffffff, 0x3], &(0x7f0000000200)=[0x3]}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 07:05:14 executing program 4: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, 0x0) exit(0x0) sendfile(r0, r1, 0x0, 0x5) 07:05:14 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x40000000001, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x105000, 0x0) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f0000000180)={0x8, 0x2, 'client1\x00', 0x4, "c38c4a960b38fe2a", "ff1b81f300bb84256c767544e11d2a92dd8c659ea9b92d143d71433bae3a66e6", 0xfff, 0x1}) ioctl$VIDIOC_SUBDEV_S_SELECTION(r2, 0xc040563e, &(0x7f0000000240)={0x0, 0x1f, 0x2, 0x5, {0x20, 0xfffffffffffffff8, 0x1, 0x5}}) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r3, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x7fff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:05:14 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="0000ea2739cda39b714c24e562713c2d0d885c6726f4f60cde4f666657a6d6c34ac4580235be4ef935665803045e77b8444d7d000000000000ba548ae0f8991690c58ab2484d6c37cd6f02e925cbfa08aecc7cde9ca69c88b70a293082dcfa7b523ca6291d27b3f89dac02841e76ca57209068505222ac7806fdbd9961120c28aa23a8d6ae35c15b559bf2556539af6ce8e7aa439272d1e5fcf4d5dbd9cdd2e172aa1ed800d3242ff7eab7008418a9b803ef585f48fdff9c9f6315b7dc85d76a532a992b41d73b8ae0e893c8eed0c2b2e6c2a2cda843b23d8021625a62d2ebb4a3ec7930a37266bc1c441f92b04a0a5ebc07b25f886a6a204a4431081879bc06fe6a8c99a6879b171ad1c4c3bacd42d9712588f49861549b8519e1ff234a761c5a4844d63b93c68da6ce71dfc8f4acfaa23ed29b4456c553b2004df1e36a0ef2ecfb7291c1d9811f4039acb6a3786ff09ed092de1ff886c89de3ce949279fcd86fdf29ef39e5533a02d64f3ea9da6b6cd022c5f30db625a6d05e2b8a8184b1a178a58deff233e9d3b7b895b63c6a885ae19d4189f5"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xffffffff000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:14 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) sendto$unix(r1, &(0x7f0000000140)="8d7d735f2a4df6d375da1328e692cc34d03d27c3d511ff6cccc655926fc458343cbae9a848298eabb78cf2110cbfdc1ce1f6dade9a8d1d4d0b674a4823ffb206dbca41ccfcbfc52d1bdf2609bb9997f7ed9e77f8f293e3ac55b832a6934855a1b91ba926d9679d1cf4efe81f652a2a4642cd5292d44c03ec302f07714cc95dcd6f075665bfc73a26459387f662d8e76cc4", 0x91, 0x800, &(0x7f0000000040)=@abs={0x1, 0x0, 0x4e20}, 0x6e) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 07:05:14 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) 07:05:14 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8, 0x4) ioctl$VIDIOC_DBG_G_REGISTER(r0, 0xc0385650, &(0x7f0000000000)={{0x4, @addr=0x1000}, 0x8, 0x6, 0x7}) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0xf, @vbi={0x6, 0x3bd, 0x0, 0x31324d4e, [0x5, 0xfffffffffffffe00], [0x7, 0x2], 0x13a}}) 07:05:15 executing program 4: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, 0x0) exit(0x0) sendfile(r0, r1, 0x0, 0x5) 07:05:15 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="0000ea2739cda39b714c24e562713c2d0d885c6726f4f60cde4f666657a6d6c34ac4580235be4ef935665803045e77b8444d7d000000000000ba548ae0f8991690c58ab2484d6c37cd6f02e925cbfa08aecc7cde9ca69c88b70a293082dcfa7b523ca6291d27b3f89dac02841e76ca57209068505222ac7806fdbd9961120c28aa23a8d6ae35c15b559bf2556539af6ce8e7aa439272d1e5fcf4d5dbd9cdd2e172aa1ed800d3242ff7eab7008418a9b803ef585f48fdff9c9f6315b7dc85d76a532a992b41d73b8ae0e893c8eed0c2b2e6c2a2cda843b23d8021625a62d2ebb4a3ec7930a37266bc1c441f92b04a0a5ebc07b25f886a6a204a4431081879bc06fe6a8c99a6879b171ad1c4c3bacd42d9712588f49861549b8519e1ff234a761c5a4844d63b93c68da6ce71dfc8f4acfaa23ed29b4456c553b2004df1e36a0ef2ecfb7291c1d9811f4039acb6a3786ff09ed092de1ff886c89de3ce949279fcd86fdf29ef39e5533a02d64f3ea9da6b6cd022c5f30db625a6d05e2b8a8184b1a178a58deff233e9d3b7b895b63c6a885ae19d4189f5"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x4402, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:15 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x2, 0x200000) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x2c, &(0x7f0000000040)=[@in6={0xa, 0x4e21, 0x2, @dev={0xfe, 0x80, [], 0x21}, 0x9407}, @in={0x2, 0x4e22, @empty}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000180)={r1, 0x7, 0x8, [0x6, 0x7f, 0x20, 0x2, 0x8001, 0xffff, 0x9, 0x0]}, &(0x7f00000001c0)=0x18) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 07:05:15 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0xfffffffffffffffe, 0x80) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000280)={0x3, @pix={0x8, 0x7, 0x30314742, 0x7, 0x5, 0x80000000, 0xe, 0x4, 0x1, 0x6}}) r1 = fcntl$getown(r0, 0x9) prctl$PR_SET_PTRACER(0x59616d61, r1) eventfd(0x80000000000009) 07:05:15 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) [ 1049.966005] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1049.988484] FAT-fs (loop0): Filesystem has been set read-only 07:05:15 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000000)=0x8000, 0x4) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 1050.053460] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:05:15 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="0000ea2739cda39b714c24e562713c2d0d885c6726f4f60cde4f666657a6d6c34ac4580235be4ef935665803045e77b8444d7d000000000000ba548ae0f8991690c58ab2484d6c37cd6f02e925cbfa08aecc7cde9ca69c88b70a293082dcfa7b523ca6291d27b3f89dac02841e76ca57209068505222ac7806fdbd9961120c28aa23a8d6ae35c15b559bf2556539af6ce8e7aa439272d1e5fcf4d5dbd9cdd2e172aa1ed800d3242ff7eab7008418a9b803ef585f48fdff9c9f6315b7dc85d76a532a992b41d73b8ae0e893c8eed0c2b2e6c2a2cda843b23d8021625a62d2ebb4a3ec7930a37266bc1c441f92b04a0a5ebc07b25f886a6a204a4431081879bc06fe6a8c99a6879b171ad1c4c3bacd42d9712588f49861549b8519e1ff234a761c5a4844d63b93c68da6ce71dfc8f4acfaa23ed29b4456c553b2004df1e36a0ef2ecfb7291c1d9811f4039acb6a3786ff09ed092de1ff886c89de3ce949279fcd86fdf29ef39e5533a02d64f3ea9da6b6cd022c5f30db625a6d05e2b8a8184b1a178a58deff233e9d3b7b895b63c6a885ae19d4189f5"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x40dd, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:15 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3, 0x2000) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x1ff, 0x7, 0x9, 0x2, 0x100000000}) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) [ 1050.106788] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1050.127554] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) 07:05:15 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x540, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:15 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x400000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000180)={0x0, 0x1000, "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"}, &(0x7f00000011c0)=0x1008) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000001200)=@sack_info={r1, 0x1, 0x200}, 0xc) r2 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r2, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:05:15 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x1, 0xc180) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f00000001c0)={0x1fb8, 0x2, 'client1\x00', 0x4, "b35819d6495d1c6e", "5d182ee8f74dd29fc12fc528bf8b4876752ad4525a3a40cf86b93b0f25bd294b", 0x6, 0x8}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:05:15 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000004c40)='/proc/self/net/pfkey\x00', 0x80, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f0000004c80)=0x80000001, 0x4) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004880)=[{{&(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000000)=""/9, 0x9}, {&(0x7f0000000200)=""/225, 0xe1}], 0x2, &(0x7f0000000340)=""/159, 0x9f, 0x2}, 0x81}, {{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000400)=""/167, 0xa7}, {&(0x7f00000004c0)=""/45, 0x2d}, {&(0x7f0000000500)=""/90, 0x5a}], 0x3, &(0x7f00000005c0)=""/4096, 0x1000, 0xfff}, 0x4}, {{&(0x7f00000015c0)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000002a00)=[{&(0x7f0000001640)=""/194, 0xc2}, {&(0x7f0000001740)=""/195, 0xc3}, {&(0x7f0000001840)=""/127, 0x7f}, {&(0x7f00000018c0)=""/36, 0x24}, {&(0x7f0000001900)=""/32, 0x20}, {&(0x7f0000001940)=""/4096, 0x1000}, {&(0x7f0000002940)=""/19, 0x13}, {&(0x7f0000002980)=""/104, 0x68}], 0x8, &(0x7f0000002a80)=""/54, 0x36, 0x5}, 0x10000}, {{&(0x7f0000002ac0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}}, 0x80, &(0x7f0000002c40)=[{&(0x7f0000002b40)}, {&(0x7f0000002b80)=""/180, 0xb4}], 0x2, &(0x7f0000002c80)=""/4, 0x4, 0x1}, 0x5}, {{0x0, 0x0, &(0x7f0000002f00)=[{&(0x7f0000002cc0)=""/206, 0xce}, {&(0x7f0000002dc0)=""/51, 0x33}, {&(0x7f0000002e00)=""/246, 0xf6}], 0x3, &(0x7f0000002f40)=""/64, 0x40, 0x6}, 0x1}, {{&(0x7f0000002f80)=@hci, 0x80, &(0x7f00000030c0)=[{&(0x7f0000003000)=""/175, 0xaf}], 0x1, &(0x7f0000003100)=""/64, 0x40, 0x9}, 0x3}, {{&(0x7f0000003140)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000003480)=[{&(0x7f00000031c0)=""/1, 0x1}, {&(0x7f0000003200)=""/240, 0xf0}, {&(0x7f0000003300)=""/168, 0xa8}, {&(0x7f00000033c0)}, {&(0x7f0000003400)=""/76, 0x4c}], 0x5, 0x0, 0x0, 0x8}, 0x8}, {{&(0x7f0000003500)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000003680)=[{&(0x7f0000003580)=""/252, 0xfc}], 0x1, &(0x7f00000036c0)=""/67, 0x43, 0x3e06}, 0x8}, {{&(0x7f0000003740)=@rc, 0x80, &(0x7f0000003840)=[{&(0x7f00000037c0)=""/127, 0x7f}], 0x1, &(0x7f0000003880)=""/4096, 0x1000, 0x5}, 0x2}], 0x9, 0x2000, &(0x7f0000004ac0)={0x0, 0x1c9c380}) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000002b40)='/dev/mixer\x00', 0x90000, 0x0) fchmodat(r3, &(0x7f00000033c0)='./file0\x00', 0x40) getsockopt$inet_opts(r2, 0x0, 0xd, &(0x7f0000004b00)=""/205, &(0x7f0000004c00)=0xcd) [ 1050.492463] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1050.510211] FAT-fs (loop0): Filesystem has been set read-only [ 1050.531523] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1050.562462] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1050.574112] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) 07:05:15 executing program 4: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, 0x0) sendfile(r0, r1, 0x0, 0x5) 07:05:15 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0xfeffffff00000000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:18 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x4000000000) tkill(r0, 0x10) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000040)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x14) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x0, 0x8000, 0x5, 0xffffffff80000001, r2}, &(0x7f0000000180)=0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 07:05:18 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000200)='/dev/video#\x00', 0x3, 0x180) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) r1 = dup3(r0, r0, 0x80000) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f00000002c0)={0x1, 0x8001, r2, 0x6, r3, 0x3, 0x4, 0x40}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000180)={0x5, {0x2, 0x4e21, @remote}, {0x2, 0x4e23, @rand_addr=0x71}, {0x2, 0x4e24, @loopback}, 0xe, 0x1, 0x10001, 0x4, 0x7ff, &(0x7f0000000000)='team_slave_0\x00', 0x8, 0x1, 0x64}) 07:05:18 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x5009000000000000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:18 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x80000) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 07:05:18 executing program 4: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x5) 07:05:18 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x8160000000000000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:18 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10) gettid() ptrace$setopts(0x4206, r0, 0x0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000040)=ANY=[@ANYBLOB="04080000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000080)=0x1c) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000140)={r2, 0x3a1}, 0x8) ptrace$cont(0x20, r0, 0x0, 0x0) 07:05:18 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f0000000180)={0xf, @raw_data="1f5900105a789f4c795b285b9dcbb85427500485565256d31a10001960986942beaf9fb7b46a46d966f1b46346432b624941ec10ad0cda895745a73f236b204f33d1f53f7b70f421d880130b36404ecdc400278cbfad7437292089d10482d97086fcd1e095f6ec4ed01efe7b1f7cc3fb8a8942b3b979d9c30944d378e176924c15c5c49c32f699823f76b0b72a0ae1be5e8feaf8c4e2b176b9ee4ba91fea7a2b2efa1657b73c0faf2912d8056ecc1a63a222206df8476781ece56cfc7d136e3f1651ffb33076440b"}) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) [ 1053.091922] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1053.119190] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1053.134723] FAT-fs (loop5): Filesystem has been set read-only 07:05:18 executing program 4: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x0, 0x0) exit(0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x5) [ 1053.152956] FAT-fs (loop0): Filesystem has been set read-only [ 1053.187562] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:05:18 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000000)={'team0\x00'}) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) [ 1053.229812] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1053.240915] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:05:18 executing program 3: r0 = getpgrp(0xffffffffffffffff) get_robust_list(r0, &(0x7f00000002c0)=&(0x7f0000000280)={&(0x7f00000001c0)={&(0x7f0000000180)}, 0x0, &(0x7f0000000240)={&(0x7f0000000200)}}, &(0x7f0000000300)=0x18) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000080)={0x3, @raw_data="b760ec4a9caded1b97c4d8a27661e5aa6c86716462e4e0324c8c64938d37b50db959471d9de75f5f781974fcd22e3ab7fd86955ae6ab3dd78ad5667af4b6582b7acca82db3b27d590350824d0fdcae6519434ed3a297f522ec09e1a1cd62bdecda3dbc1d16550b348b216d11f2b3861c6fb928c8ee718f78c96c7f478b68fcb810f76c4dfb445b08f050e9ba29e6ffadd054f9965a7de53b81ecde0dbbc3b636391a42c6f37405a3289420bd8b09bc961385247ce0e9bcff5765ce1b5b54e396b472272d085aa9ff"}) 07:05:18 executing program 4: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') exit(0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x5) 07:05:18 executing program 2: r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) pwritev(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="e50a16990d84cd77ee46a884fdfe69f4050b7c028c0b10fd1c2efe1aa6cf3714d1354127abb9eb7efd69290598806cee19fa80c4924709e892d30015740f3225cd036b15eab02bddef2e8204a25693f3d91065d23f4bb6e34dfa4db6ecc6ccf0dbee2a33801d88352637b18f7277feba7587e3a9ebd9bff2a68152f05b60a6fbc28fccf53cab60306f667d", 0x8b}], 0x1, 0x0) tkill(r0, 0x1000000080c) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x706f, 0x60}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x10100, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x3fffe, 0x0) [ 1053.282420] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) [ 1053.301545] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) [ 1053.302308] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) 07:05:18 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x9808000000000000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:18 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="0000ea2739cda39b714c24e562713c2d0d885c6726f4f60cde4f666657a6d6c34ac4580235be4ef935665803045e77b8444d7d000000000000ba548ae0f8991690c58ab2484d6c37cd6f02e925cbfa08aecc7cde9ca69c88b70a293082dcfa7b523ca6291d27b3f89dac02841e76ca57209068505222ac7806fdbd9961120c28aa23a8d6ae35c15b559bf2556539af6ce8e7aa439272d1e5fcf4d5dbd9cdd2e172aa1ed800d3242ff7eab7008418a9b803ef585f48fdff9c9f6315b7dc85d76a532a992b41d73b8ae0e893c8eed0c2b2e6c2a2cda843b23d8021625a62d2ebb4a3ec7930a37266bc1c441f92b04a0a5ebc07b25f886a6a204a4431081879bc06fe6a8c99a6879b171ad1c4c3bacd42d9712588f49861549b8519e1ff234a761c5a4844d63b93c68da6ce71dfc8f4acfaa23ed29b4456c553b2004df1e36a0ef2ecfb7291c1d9811f4039acb6a3786ff09ed092de1ff886c89de3ce949279fcd86fdf29ef39e5533a02d64f3ea9da6b6cd022c5f30db625a6d05e2b8a8184b1a178a58deff233e9d3b7b895b63c6a885ae19d4189f5"], 0x195) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000)=0x940b000000000000, 0x8080fffffffe) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000440)=0xe8) fstat(r2, &(0x7f0000000480)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000580)=0xc) write$cgroup_pid(r1, &(0x7f00000005c0)=r3, 0x12) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000ec0)=[{&(0x7f0000000e40)="7900c27e81bdd8bc9e32cbd002e34b4326d937be6afa671c79e1c4a972008ae95c07facc42b4d4ab54f61eded2290da72f5f662ab8257abdd81b42070453aa9c9b2dc19a22b09a5c66cb8919a4a52536cb3d00f2474a03eacf905121e659ff8cafdd", 0x62, 0x3}], 0x4000, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000700)=""/169) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@md5={0x1, "bb2a0ff6cd817160fe232cd194ef917c"}, 0x11, 0x3) 07:05:18 executing program 4: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') exit(0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x5) 07:05:18 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x3, @win={{0x8000, 0xce9, 0x7f, 0x8}, 0x2, 0x4, &(0x7f00000001c0)={{0x0, 0x3, 0x10001, 0x6}, &(0x7f0000000180)={{0x5, 0x9, 0x0, 0xffffffffffffffff}, &(0x7f0000000000)={{0x7fff, 0x7, 0x3, 0x6}}}}, 0x100000, &(0x7f0000000200)="cb08ddfe4ebd57582cd89d4683e0454e8d48ed67fc2676c1a21f6a30ef643c3a4cabd3b881382fea724ddc98d0561797d125c901cb9d8123264780235cc48c222ee77c70f2c640e0ab678be1746760b8c20926b65ad95950294a17630260052f78279022fc8e3f8c23f00283e8b167c625f54d84b2d8992013e02e3bf300cf1304ef89740215bd09b2", 0x8}}) 07:05:18 executing program 4: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') exit(0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x5) [ 1053.512775] BUG: pagefault on kernel address 0xffffc900129b9000 in non-whitelisted uaccess [ 1053.521792] BUG: unable to handle kernel paging request at ffffc900129b9000 [ 1053.522028] ------------[ cut here ]------------ [ 1053.528893] PGD 1da95a067 P4D 1da95a067 PUD 1da95b067 PMD 1b9a5a067 PTE 0 [ 1053.533662] downgrading a read lock [ 1053.533756] WARNING: CPU: 1 PID: 725 at kernel/locking/lockdep.c:3556 lock_downgrade+0x4d7/0x900 [ 1053.540586] Oops: 0000 [#1] PREEMPT SMP KASAN [ 1053.544187] Kernel panic - not syncing: panic_on_warn set ... [ 1053.553096] CPU: 0 PID: 728 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #142 [ 1053.570620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1053.579974] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 1053.585851] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 1053.604744] RSP: 0018:ffff8881b6fdf680 EFLAGS: 00010206 [ 1053.610432] RAX: 0000000000000000 RBX: 00000000000fd200 RCX: 00000000000f5200 [ 1053.617690] RDX: 00000000000fd200 RSI: ffffc900129b9000 RDI: 0000000020008200 [ 1053.624947] RBP: ffff8881b6fdf6b8 R08: 0000000000000000 R09: 0000000000003f48 [ 1053.632208] R10: fffff52002555c3f R11: ffffc90012aae1ff R12: 00000000200fd400 [ 1053.639466] R13: 0000000020000200 R14: ffffc900129b1000 R15: 00007ffffffff000 [ 1053.646730] FS: 00007f22ad235700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000 [ 1053.654945] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1053.660817] CR2: ffffc900129b9000 CR3: 00000001849ed000 CR4: 00000000001406f0 [ 1053.668083] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1053.675343] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1053.682600] Call Trace: [ 1053.685191] ? _copy_to_user+0xf6/0x110 [ 1053.689231] vidioc_g_fmt_vid_overlay+0x392/0x550 [ 1053.694075] v4l_g_fmt+0x2ad/0x640 [ 1053.697612] __video_do_ioctl+0x8b1/0x1050 [ 1053.701841] ? v4l_s_fmt+0x990/0x990 [ 1053.705562] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1053.711366] video_usercopy+0x5c1/0x1760 [ 1053.715421] ? v4l_s_fmt+0x990/0x990 [ 1053.719140] ? v4l_enumstd+0x70/0x70 [ 1053.722851] ? rcu_softirq_qs+0x20/0x20 [ 1053.726830] ? find_held_lock+0x36/0x1c0 [ 1053.731152] ? __fget+0x4aa/0x740 [ 1053.734603] ? lock_downgrade+0x900/0x900 [ 1053.738746] ? check_preemption_disabled+0x48/0x280 [ 1053.743754] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1053.748681] ? smk_access+0x53b/0x700 [ 1053.752473] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1053.757750] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1053.763277] ? smack_log+0x423/0x590 [ 1053.766986] ? smk_access_entry+0x310/0x310 [ 1053.771834] ? __fget+0x4d1/0x740 [ 1053.775290] ? smk_tskacc+0x3dd/0x520 [ 1053.779087] ? video_usercopy+0x1760/0x1760 [ 1053.783402] video_ioctl2+0x2c/0x33 [ 1053.787022] v4l2_ioctl+0x154/0x1b0 [ 1053.790642] ? video_devdata+0xa0/0xa0 [ 1053.794522] do_vfs_ioctl+0x1de/0x1790 [ 1053.798407] ? ioctl_preallocate+0x300/0x300 [ 1053.802808] ? smk_curacc+0x7f/0xa0 [ 1053.806431] ? smack_file_ioctl+0x210/0x3c0 [ 1053.811017] ? fget_raw+0x20/0x20 [ 1053.814464] ? smack_file_lock+0x2e0/0x2e0 [ 1053.818699] ? do_syscall_64+0x9a/0x820 [ 1053.822677] ? do_syscall_64+0x9a/0x820 [ 1053.826645] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1053.832181] ? security_file_ioctl+0x94/0xc0 [ 1053.836583] ksys_ioctl+0xa9/0xd0 [ 1053.840029] __x64_sys_ioctl+0x73/0xb0 [ 1053.843933] do_syscall_64+0x1b9/0x820 [ 1053.847813] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1053.853183] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1053.858111] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1053.862960] ? trace_hardirqs_on_caller+0x310/0x310 [ 1053.867970] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1053.872983] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1053.877993] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1053.882829] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1053.888006] RIP: 0033:0x457569 [ 1053.891197] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1053.910433] RSP: 002b:00007f22ad234c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1053.918131] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 1053.925396] RDX: 0000000020000080 RSI: 00000000c0d05604 RDI: 0000000000000003 [ 1053.932655] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1053.940273] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f22ad2356d4 [ 1053.947534] R13: 00000000004c1b8f R14: 00000000004d2f90 R15: 00000000ffffffff [ 1053.954795] Modules linked in: [ 1053.957975] CR2: ffffc900129b9000 [ 1053.961416] ---[ end trace c34e90662788fc6d ]--- [ 1053.966171] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 1053.972048] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 1053.990937] RSP: 0018:ffff8881b6fdf680 EFLAGS: 00010206 [ 1053.996289] RAX: 0000000000000000 RBX: 00000000000fd200 RCX: 00000000000f5200 [ 1054.003548] RDX: 00000000000fd200 RSI: ffffc900129b9000 RDI: 0000000020008200 [ 1054.011075] RBP: ffff8881b6fdf6b8 R08: 0000000000000000 R09: 0000000000003f48 [ 1054.018337] R10: fffff52002555c3f R11: ffffc90012aae1ff R12: 00000000200fd400 [ 1054.026203] R13: 0000000020000200 R14: ffffc900129b1000 R15: 00007ffffffff000 [ 1054.033464] FS: 00007f22ad235700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000 [ 1054.041682] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1054.047555] CR2: ffffc900129b9000 CR3: 00000001849ed000 CR4: 00000000001406f0 [ 1054.054816] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1054.062083] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1054.714039] Shutting down cpus with NMI [ 1054.719274] Kernel Offset: disabled [ 1054.722901] Rebooting in 86400 seconds..